{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:GZ3CLRGHBZ2Z5BCS3FLURB5RJA","short_pith_number":"pith:GZ3CLRGH","canonical_record":{"source":{"id":"1006.5003","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-06-25T14:16:35Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"11bd3a27021703d5fdf18017dab8159cc944c61a553db2e67c0f63b186d1b435","abstract_canon_sha256":"ae66cf4d189f2a9ea28b3e4a5c14aaf2e066f47dac829655b40a51adc2c5976e"},"schema_version":"1.0"},"canonical_sha256":"367625c4c70e759e8452d9574887b148128f4cdd1abafd73f20005938343ad20","source":{"kind":"arxiv","id":"1006.5003","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1006.5003","created_at":"2026-05-18T02:25:49Z"},{"alias_kind":"arxiv_version","alias_value":"1006.5003v2","created_at":"2026-05-18T02:25:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1006.5003","created_at":"2026-05-18T02:25:49Z"},{"alias_kind":"pith_short_12","alias_value":"GZ3CLRGHBZ2Z","created_at":"2026-05-18T12:26:07Z"},{"alias_kind":"pith_short_16","alias_value":"GZ3CLRGHBZ2Z5BCS","created_at":"2026-05-18T12:26:07Z"},{"alias_kind":"pith_short_8","alias_value":"GZ3CLRGH","created_at":"2026-05-18T12:26:07Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:GZ3CLRGHBZ2Z5BCS3FLURB5RJA","target":"record","payload":{"canonical_record":{"source":{"id":"1006.5003","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-06-25T14:16:35Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"11bd3a27021703d5fdf18017dab8159cc944c61a553db2e67c0f63b186d1b435","abstract_canon_sha256":"ae66cf4d189f2a9ea28b3e4a5c14aaf2e066f47dac829655b40a51adc2c5976e"},"schema_version":"1.0"},"canonical_sha256":"367625c4c70e759e8452d9574887b148128f4cdd1abafd73f20005938343ad20","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:25:49.416215Z","signature_b64":"mQpn02/reBmbVGmzpFs1Ie0PST8gfZlgIlllIZKovjD+j06Aj+fV1wdkpazuImmMJe7a8eF5nnWWRUE81o7zDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"367625c4c70e759e8452d9574887b148128f4cdd1abafd73f20005938343ad20","last_reissued_at":"2026-05-18T02:25:49.415830Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:25:49.415830Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1006.5003","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:25:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"WZQKpTiQfVCKjH4EVjHkEVMbr7YlRzoCkuVZHPjAnbRuL+FPHeaGo1C8T9Fe8vOq3rkOjL7e+LkEYXrh4+6qCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T08:44:29.086993Z"},"content_sha256":"e8c332eda4b773ba5ec8fe396382f5695ed8393f1cb1ae5a50cabf1e0d0d7012","schema_version":"1.0","event_id":"sha256:e8c332eda4b773ba5ec8fe396382f5695ed8393f1cb1ae5a50cabf1e0d0d7012"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:GZ3CLRGHBZ2Z5BCS3FLURB5RJA","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.NI"],"primary_cat":"cs.GT","authors_text":"Mattia Monga, Nicola Gatti, Sabrina Sicari","submitted_at":"2010-06-25T14:16:35Z","abstract_excerpt":"Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node localization. In particular, we analyze the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model thi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1006.5003","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:25:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"v9wI530lEUJExNUnmiOUH+gKqshFlXUuDLMkLbzdV+KeEzuYQJpDRS/47hzSVwz3mwCsw8zM5C6dtbx5yqeWBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T08:44:29.087729Z"},"content_sha256":"a13e137da4a15dbab22c849f96d359a5213aa1295783da86a757258bd137e814","schema_version":"1.0","event_id":"sha256:a13e137da4a15dbab22c849f96d359a5213aa1295783da86a757258bd137e814"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/GZ3CLRGHBZ2Z5BCS3FLURB5RJA/bundle.json","state_url":"https://pith.science/pith/GZ3CLRGHBZ2Z5BCS3FLURB5RJA/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/GZ3CLRGHBZ2Z5BCS3FLURB5RJA/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T08:44:29Z","links":{"resolver":"https://pith.science/pith/GZ3CLRGHBZ2Z5BCS3FLURB5RJA","bundle":"https://pith.science/pith/GZ3CLRGHBZ2Z5BCS3FLURB5RJA/bundle.json","state":"https://pith.science/pith/GZ3CLRGHBZ2Z5BCS3FLURB5RJA/state.json","well_known_bundle":"https://pith.science/.well-known/pith/GZ3CLRGHBZ2Z5BCS3FLURB5RJA/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:GZ3CLRGHBZ2Z5BCS3FLURB5RJA","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ae66cf4d189f2a9ea28b3e4a5c14aaf2e066f47dac829655b40a51adc2c5976e","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-06-25T14:16:35Z","title_canon_sha256":"11bd3a27021703d5fdf18017dab8159cc944c61a553db2e67c0f63b186d1b435"},"schema_version":"1.0","source":{"id":"1006.5003","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1006.5003","created_at":"2026-05-18T02:25:49Z"},{"alias_kind":"arxiv_version","alias_value":"1006.5003v2","created_at":"2026-05-18T02:25:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1006.5003","created_at":"2026-05-18T02:25:49Z"},{"alias_kind":"pith_short_12","alias_value":"GZ3CLRGHBZ2Z","created_at":"2026-05-18T12:26:07Z"},{"alias_kind":"pith_short_16","alias_value":"GZ3CLRGHBZ2Z5BCS","created_at":"2026-05-18T12:26:07Z"},{"alias_kind":"pith_short_8","alias_value":"GZ3CLRGH","created_at":"2026-05-18T12:26:07Z"}],"graph_snapshots":[{"event_id":"sha256:a13e137da4a15dbab22c849f96d359a5213aa1295783da86a757258bd137e814","target":"graph","created_at":"2026-05-18T02:25:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node localization. In particular, we analyze the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model thi","authors_text":"Mattia Monga, Nicola Gatti, Sabrina Sicari","cross_cats":["cs.NI"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-06-25T14:16:35Z","title":"A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1006.5003","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:e8c332eda4b773ba5ec8fe396382f5695ed8393f1cb1ae5a50cabf1e0d0d7012","target":"record","created_at":"2026-05-18T02:25:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ae66cf4d189f2a9ea28b3e4a5c14aaf2e066f47dac829655b40a51adc2c5976e","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-06-25T14:16:35Z","title_canon_sha256":"11bd3a27021703d5fdf18017dab8159cc944c61a553db2e67c0f63b186d1b435"},"schema_version":"1.0","source":{"id":"1006.5003","kind":"arxiv","version":2}},"canonical_sha256":"367625c4c70e759e8452d9574887b148128f4cdd1abafd73f20005938343ad20","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"367625c4c70e759e8452d9574887b148128f4cdd1abafd73f20005938343ad20","first_computed_at":"2026-05-18T02:25:49.415830Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:25:49.415830Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"mQpn02/reBmbVGmzpFs1Ie0PST8gfZlgIlllIZKovjD+j06Aj+fV1wdkpazuImmMJe7a8eF5nnWWRUE81o7zDg==","signature_status":"signed_v1","signed_at":"2026-05-18T02:25:49.416215Z","signed_message":"canonical_sha256_bytes"},"source_id":"1006.5003","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:e8c332eda4b773ba5ec8fe396382f5695ed8393f1cb1ae5a50cabf1e0d0d7012","sha256:a13e137da4a15dbab22c849f96d359a5213aa1295783da86a757258bd137e814"],"state_sha256":"d4df51f1339a640d2d4fefdd476a64e132694e8e24ecef22c01086481b84c8f1"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ktjQ9jIoqe6Tf6G/VmbYpQhjIlotrZooKpA0jgWXmADhhxLNi7769bwBcX5uyeH0VkntEooSTU41lcOJgAZzCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T08:44:29.091605Z","bundle_sha256":"fbaabfb09df1791e3cec5944750d71e7f4937707ddd347fd868191a67f49d1ec"}}