{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:GO53FW6HATNEIYBBE45WZTOBTC","short_pith_number":"pith:GO53FW6H","canonical_record":{"source":{"id":"1803.08415","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2018-03-22T15:44:34Z","cross_cats_sorted":[],"title_canon_sha256":"4383090dde3bfe70fe7e222a44b484c0efacacf4d0d5a04d5b0edccce13c73a2","abstract_canon_sha256":"c46453e317f119d7f106313c167a429e7a76d2eacf7c86172f904dc138a99b56"},"schema_version":"1.0"},"canonical_sha256":"33bbb2dbc704da446021273b6ccdc198ad4e9e9038600df42cbb845d6d39ab8d","source":{"kind":"arxiv","id":"1803.08415","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.08415","created_at":"2026-05-18T00:07:32Z"},{"alias_kind":"arxiv_version","alias_value":"1803.08415v2","created_at":"2026-05-18T00:07:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.08415","created_at":"2026-05-18T00:07:32Z"},{"alias_kind":"pith_short_12","alias_value":"GO53FW6HATNE","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GO53FW6HATNEIYBB","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GO53FW6H","created_at":"2026-05-18T12:32:25Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:GO53FW6HATNEIYBBE45WZTOBTC","target":"record","payload":{"canonical_record":{"source":{"id":"1803.08415","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2018-03-22T15:44:34Z","cross_cats_sorted":[],"title_canon_sha256":"4383090dde3bfe70fe7e222a44b484c0efacacf4d0d5a04d5b0edccce13c73a2","abstract_canon_sha256":"c46453e317f119d7f106313c167a429e7a76d2eacf7c86172f904dc138a99b56"},"schema_version":"1.0"},"canonical_sha256":"33bbb2dbc704da446021273b6ccdc198ad4e9e9038600df42cbb845d6d39ab8d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:07:32.713001Z","signature_b64":"ugGl/BRfPh8rzldCA4AWjFhmfMFsmR8YokMv9Qr0GaUhtmq9lO907gA6mwm7m4jKPr5TYXVnsmgkrrcix8tbAw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"33bbb2dbc704da446021273b6ccdc198ad4e9e9038600df42cbb845d6d39ab8d","last_reissued_at":"2026-05-18T00:07:32.712461Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:07:32.712461Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.08415","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:07:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"EiVzFSGPUBEmQDVlysLMpHKR5YftW25aVSYaFbyiv0VW+Xvgm84zk1eDy9Ou4N8qav187c1kN+VMfHAiDMdWCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T21:35:15.660856Z"},"content_sha256":"7b742a80f74adad4e89ea7a4e8c17101a192cc8e624a9712dadd0c259b049241","schema_version":"1.0","event_id":"sha256:7b742a80f74adad4e89ea7a4e8c17101a192cc8e624a9712dadd0c259b049241"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:GO53FW6HATNEIYBBE45WZTOBTC","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Signaling Game-based Misbehavior Inspection in V2I-enabled Highway Operations","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Li Jin, Manxi Wu, Patrick Jaillet, Saurabh Amin","submitted_at":"2018-03-22T15:44:34Z","abstract_excerpt":"Vehicle-to-Infrastructure (V2I) communications are increasingly supporting highway operations such as electronic toll collection, carpooling, and vehicle platooning. In this paper we study the incentives of strategic misbehavior by individual vehicles who can exploit the security vulnerabilities in V2I communications and negatively impact the highway operations. We consider a V2I-enabled highway segment facing two classes of vehicles (agent populations), each with an authorized access to one server (subset of lanes). Vehicles are strategic in that they can misreport their class (type) to the s"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.08415","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:07:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Y4zLDWMBJb71sZrUzt2vxW8Ob7cDuc5/q2Nk3KRIQLE5c38BTCPVUUv4Izcu+ZPmUfJK2JWlgNcJgph1XnX4Aw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T21:35:15.661200Z"},"content_sha256":"e70e1d1555a28c042255204e81039f862457f075a6705aba83d1b391f5d89300","schema_version":"1.0","event_id":"sha256:e70e1d1555a28c042255204e81039f862457f075a6705aba83d1b391f5d89300"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/GO53FW6HATNEIYBBE45WZTOBTC/bundle.json","state_url":"https://pith.science/pith/GO53FW6HATNEIYBBE45WZTOBTC/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/GO53FW6HATNEIYBBE45WZTOBTC/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T21:35:15Z","links":{"resolver":"https://pith.science/pith/GO53FW6HATNEIYBBE45WZTOBTC","bundle":"https://pith.science/pith/GO53FW6HATNEIYBBE45WZTOBTC/bundle.json","state":"https://pith.science/pith/GO53FW6HATNEIYBBE45WZTOBTC/state.json","well_known_bundle":"https://pith.science/.well-known/pith/GO53FW6HATNEIYBBE45WZTOBTC/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:GO53FW6HATNEIYBBE45WZTOBTC","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c46453e317f119d7f106313c167a429e7a76d2eacf7c86172f904dc138a99b56","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2018-03-22T15:44:34Z","title_canon_sha256":"4383090dde3bfe70fe7e222a44b484c0efacacf4d0d5a04d5b0edccce13c73a2"},"schema_version":"1.0","source":{"id":"1803.08415","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.08415","created_at":"2026-05-18T00:07:32Z"},{"alias_kind":"arxiv_version","alias_value":"1803.08415v2","created_at":"2026-05-18T00:07:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.08415","created_at":"2026-05-18T00:07:32Z"},{"alias_kind":"pith_short_12","alias_value":"GO53FW6HATNE","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GO53FW6HATNEIYBB","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GO53FW6H","created_at":"2026-05-18T12:32:25Z"}],"graph_snapshots":[{"event_id":"sha256:e70e1d1555a28c042255204e81039f862457f075a6705aba83d1b391f5d89300","target":"graph","created_at":"2026-05-18T00:07:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Vehicle-to-Infrastructure (V2I) communications are increasingly supporting highway operations such as electronic toll collection, carpooling, and vehicle platooning. In this paper we study the incentives of strategic misbehavior by individual vehicles who can exploit the security vulnerabilities in V2I communications and negatively impact the highway operations. We consider a V2I-enabled highway segment facing two classes of vehicles (agent populations), each with an authorized access to one server (subset of lanes). Vehicles are strategic in that they can misreport their class (type) to the s","authors_text":"Li Jin, Manxi Wu, Patrick Jaillet, Saurabh Amin","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2018-03-22T15:44:34Z","title":"Signaling Game-based Misbehavior Inspection in V2I-enabled Highway Operations"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.08415","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:7b742a80f74adad4e89ea7a4e8c17101a192cc8e624a9712dadd0c259b049241","target":"record","created_at":"2026-05-18T00:07:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c46453e317f119d7f106313c167a429e7a76d2eacf7c86172f904dc138a99b56","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2018-03-22T15:44:34Z","title_canon_sha256":"4383090dde3bfe70fe7e222a44b484c0efacacf4d0d5a04d5b0edccce13c73a2"},"schema_version":"1.0","source":{"id":"1803.08415","kind":"arxiv","version":2}},"canonical_sha256":"33bbb2dbc704da446021273b6ccdc198ad4e9e9038600df42cbb845d6d39ab8d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"33bbb2dbc704da446021273b6ccdc198ad4e9e9038600df42cbb845d6d39ab8d","first_computed_at":"2026-05-18T00:07:32.712461Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:07:32.712461Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ugGl/BRfPh8rzldCA4AWjFhmfMFsmR8YokMv9Qr0GaUhtmq9lO907gA6mwm7m4jKPr5TYXVnsmgkrrcix8tbAw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:07:32.713001Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.08415","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:7b742a80f74adad4e89ea7a4e8c17101a192cc8e624a9712dadd0c259b049241","sha256:e70e1d1555a28c042255204e81039f862457f075a6705aba83d1b391f5d89300"],"state_sha256":"b26b68c13cd31746f5f86663ca5f01bef00a1bd4d951c0a6936b855a908d4f29"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/4ioi0HgITH959628gwhSI0TXSlxMRj0Zvf9KPSpTCkojtr3VJY4cbGs3vLd2jnz73pOWWcgxevnFuhKFVRgAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T21:35:15.663269Z","bundle_sha256":"8e17e7a55fc7f4031537cd13b1f09f4fd01b894681c99971ce4eba54414aaf65"}}