{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:6WCDQ2K6SGGLEMPSTL4HRLT4YS","short_pith_number":"pith:6WCDQ2K6","schema_version":"1.0","canonical_sha256":"f58438695e918cb231f29af878ae7cc4af8669a83c327f546c0959a29a898c3a","source":{"kind":"arxiv","id":"1902.03562","version":1},"attestation_state":"computed","paper":{"title":"A Novel Secure Authentication Scheme for Heterogeneous Internet of Thing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Ailian Ren, Jingwei Liu, Lihuan Zhang, Mohsen Guizani, Rong Sun, Xiaojiang Du","submitted_at":"2019-02-10T09:46:20Z","abstract_excerpt":"Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's lives have changed dramatically. Due to its capabilities of sensitive data-aware, information collection, communication and processing, it raises security and privacy concerns. Moreover, a malicious attacker may impersonate a legitimate user, which may cause security threat and violation privacy. In allusion to the above problems, we propose"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1902.03562","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-02-10T09:46:20Z","cross_cats_sorted":[],"title_canon_sha256":"7f4ad6793930b03e319221608283e8513326e5e4e5a965800a41d461ce1233df","abstract_canon_sha256":"930b5b4fc3ab45abf4384a530c26310287c22419de100cfcff3f91c5ad26cde9"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:54:20.427914Z","signature_b64":"7NKvkILfT23q2H1EYlR6bTtdsdqafYRKXBITaALWAXp2a18EXNUcbTV4Kdk7QQGf2XujQiEukZE+7J4lKV2zBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f58438695e918cb231f29af878ae7cc4af8669a83c327f546c0959a29a898c3a","last_reissued_at":"2026-05-17T23:54:20.427115Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:54:20.427115Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"A Novel Secure Authentication Scheme for Heterogeneous Internet of Thing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Ailian Ren, Jingwei Liu, Lihuan Zhang, Mohsen Guizani, Rong Sun, Xiaojiang Du","submitted_at":"2019-02-10T09:46:20Z","abstract_excerpt":"Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's lives have changed dramatically. Due to its capabilities of sensitive data-aware, information collection, communication and processing, it raises security and privacy concerns. Moreover, a malicious attacker may impersonate a legitimate user, which may cause security threat and violation privacy. In allusion to the above problems, we propose"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1902.03562","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1902.03562","created_at":"2026-05-17T23:54:20.427284+00:00"},{"alias_kind":"arxiv_version","alias_value":"1902.03562v1","created_at":"2026-05-17T23:54:20.427284+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1902.03562","created_at":"2026-05-17T23:54:20.427284+00:00"},{"alias_kind":"pith_short_12","alias_value":"6WCDQ2K6SGGL","created_at":"2026-05-18T12:33:10.108867+00:00"},{"alias_kind":"pith_short_16","alias_value":"6WCDQ2K6SGGLEMPS","created_at":"2026-05-18T12:33:10.108867+00:00"},{"alias_kind":"pith_short_8","alias_value":"6WCDQ2K6","created_at":"2026-05-18T12:33:10.108867+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS","json":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS.json","graph_json":"https://pith.science/api/pith-number/6WCDQ2K6SGGLEMPSTL4HRLT4YS/graph.json","events_json":"https://pith.science/api/pith-number/6WCDQ2K6SGGLEMPSTL4HRLT4YS/events.json","paper":"https://pith.science/paper/6WCDQ2K6"},"agent_actions":{"view_html":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS","download_json":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS.json","view_paper":"https://pith.science/paper/6WCDQ2K6","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1902.03562&json=true","fetch_graph":"https://pith.science/api/pith-number/6WCDQ2K6SGGLEMPSTL4HRLT4YS/graph.json","fetch_events":"https://pith.science/api/pith-number/6WCDQ2K6SGGLEMPSTL4HRLT4YS/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS/action/timestamp_anchor","attest_storage":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS/action/storage_attestation","attest_author":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS/action/author_attestation","sign_citation":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS/action/citation_signature","submit_replication":"https://pith.science/pith/6WCDQ2K6SGGLEMPSTL4HRLT4YS/action/replication_record"}},"created_at":"2026-05-17T23:54:20.427284+00:00","updated_at":"2026-05-17T23:54:20.427284+00:00"}