{"id":"https://openalex.org/W7119120960","doi":"https://doi.org/10.48550/arxiv.2601.00273","title":"From Consensus to Chaos: A Vulnerability Assessment of the RAFT Algorithm","display_name":"From Consensus to Chaos: A Vulnerability Assessment of the RAFT Algorithm","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7119120960","doi":"https://doi.org/10.48550/arxiv.2601.00273"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.00273","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00273","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.00273","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121827537","display_name":"Tamer Afifi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Afifi, Tamer","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121831057","display_name":"Abdelfatah Hegazy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hegazy, Abdelfatah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5121762181","display_name":"Ehab Abousaif","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abousaif, Ehab","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5121827537"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.8934000134468079,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.8934000134468079,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.016300000250339508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.01080000028014183,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/raft","display_name":"Raft","score":0.7430999875068665},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5313000082969666},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5084999799728394},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.47769999504089355},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.39719998836517334},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.38339999318122864},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.3549000024795532},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.3515999913215637},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.3352999985218048}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7849000096321106},{"id":"https://openalex.org/C9132879","wikidata":"https://www.wikidata.org/wiki/Q17100313","display_name":"Raft","level":4,"score":0.7430999875068665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5410000085830688},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5313000082969666},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5084999799728394},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.47769999504089355},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.39719998836517334},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38830000162124634},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.38339999318122864},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.3549000024795532},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3515999913215637},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.3352999985218048},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.33320000767707825},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.328900009393692},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.326200008392334},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.296999990940094},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2906999886035919},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.28290000557899475},{"id":"https://openalex.org/C105289051","wikidata":"https://www.wikidata.org/wiki/Q1930094","display_name":"Pillar","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2782999873161316},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.25450000166893005},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.00273","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00273","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.00273","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00273","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"recent":[1],"decades,":[2],"the":[3,14,28,61,80,109,118,138,175,178,183],"RAFT":[4,31,62,81,179],"distributed":[5,15,188],"consensus":[6,65,119],"algorithm":[7],"has":[8],"become":[9],"a":[10,67,75,84,104,153,171],"main":[11],"pillar":[12],"of":[13,54,64,69,79,129,177,185],"systems":[16],"ecosystem,":[17],"ensuring":[18],"data":[19,70,124],"consistency":[20],"and":[21,39,56,98,121,137,162,181],"fault":[22],"tolerance":[23],"across":[24],"multiple":[25],"nodes.":[26],"Although":[27],"fact":[29],"that":[30,144],"is":[32,132,165],"well":[33],"known":[34],"for":[35,173],"its":[36,41,88],"simplicity,":[37],"reliability,":[38],"efficiency,":[40],"security":[42,77,91,176],"properties":[43],"are":[44,147],"not":[45],"fully":[46],"recognized,":[47],"leaving":[48],"implementations":[49,180],"vulnerable":[50],"to":[51,90,113,123],"different":[52],"kinds":[53],"attacks":[55,97,131],"threats,":[57],"which":[58],"can":[59,107],"transform":[60],"harmony":[63],"into":[66],"chaos":[68],"inconsistency.":[71,125],"This":[72,167],"paper":[73],"presents":[74],"systematic":[76],"analysis":[78],"protocol,":[82],"with":[83],"specific":[85],"focus":[86],"on":[87,157],"susceptibility":[89],"threats":[92],"such":[93],"as":[94],"message":[95,99,160],"replay":[96],"forgery":[100],"attacks.":[101],"Examined":[102],"how":[103],"malicious":[105],"actor":[106],"exploit":[108],"protocol's":[110],"message-passing":[111],"mechanism":[112],"reintroduce":[114],"old":[115],"messages,":[116],"disrupting":[117],"process":[120],"leading":[122],"The":[126],"practical":[127],"feasibility":[128],"these":[130,151],"examined":[133],"through":[134],"simulated":[135],"scenarios,":[136],"key":[139],"weaknesses":[140],"in":[141],"RAFT's":[142],"design":[143],"enable":[145],"them":[146],"identified.":[148],"To":[149],"address":[150],"vulnerabilities,":[152],"novel":[154],"approach":[155],"based":[156],"cryptography,":[158],"authenticated":[159],"verification,":[161],"freshness":[163],"check":[164],"proposed.":[166],"proposed":[168],"solution":[169],"provides":[170],"framework":[172],"enhancing":[174],"guiding":[182],"development":[184],"more":[186],"resilient":[187],"systems.":[189]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
