{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:HJVT42Z3BOJN6P4N77RM3NPJ4Y","short_pith_number":"pith:HJVT42Z3","canonical_record":{"source":{"id":"1506.07955","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/publicdomain/zero/1.0/","primary_cat":"cs.SY","submitted_at":"2015-06-26T04:23:57Z","cross_cats_sorted":["math.OC"],"title_canon_sha256":"d8d5be74d0d5900f6faebfef870a32434c16cda1c24660f00b384785ac71109e","abstract_canon_sha256":"412c4884d94f7f08a7373c3093e93397184389f114a0b24943ab562efb5c128e"},"schema_version":"1.0"},"canonical_sha256":"3a6b3e6b3b0b92df3f8dffe2cdb5e9e6271dfe6b589418685dd39c0363832ba2","source":{"kind":"arxiv","id":"1506.07955","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.07955","created_at":"2026-05-18T00:59:01Z"},{"alias_kind":"arxiv_version","alias_value":"1506.07955v1","created_at":"2026-05-18T00:59:01Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.07955","created_at":"2026-05-18T00:59:01Z"},{"alias_kind":"pith_short_12","alias_value":"HJVT42Z3BOJN","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_16","alias_value":"HJVT42Z3BOJN6P4N","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_8","alias_value":"HJVT42Z3","created_at":"2026-05-18T12:29:25Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:HJVT42Z3BOJN6P4N77RM3NPJ4Y","target":"record","payload":{"canonical_record":{"source":{"id":"1506.07955","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/publicdomain/zero/1.0/","primary_cat":"cs.SY","submitted_at":"2015-06-26T04:23:57Z","cross_cats_sorted":["math.OC"],"title_canon_sha256":"d8d5be74d0d5900f6faebfef870a32434c16cda1c24660f00b384785ac71109e","abstract_canon_sha256":"412c4884d94f7f08a7373c3093e93397184389f114a0b24943ab562efb5c128e"},"schema_version":"1.0"},"canonical_sha256":"3a6b3e6b3b0b92df3f8dffe2cdb5e9e6271dfe6b589418685dd39c0363832ba2","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:59:01.702172Z","signature_b64":"y2JX1N3aPk9+yctDDX8In0AL/Ph1z/aM+50oejyntCbXVu92S7FLHoKcNp5wS93V8uIoqaez7SsP9ozTBDQmBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3a6b3e6b3b0b92df3f8dffe2cdb5e9e6271dfe6b589418685dd39c0363832ba2","last_reissued_at":"2026-05-18T00:59:01.701643Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:59:01.701643Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1506.07955","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:59:01Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DpujOkxMi0CG/8iNdN7OQt/OUtAcnY4fyPL1hLmnoRWFeKcW9mwLyLvQro9W9LwItJ7xFHNz2J2Yw/cOcYlUAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T19:25:23.782627Z"},"content_sha256":"9168c71ab2a3e376ad8718d07bda859815059296df5377b8eb2a6bb78d9b0714","schema_version":"1.0","event_id":"sha256:9168c71ab2a3e376ad8718d07bda859815059296df5377b8eb2a6bb78d9b0714"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:HJVT42Z3BOJN6P4N77RM3NPJ4Y","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Fake-Acknowledgment Attack on ACK-based Sensor Power Schedule for Remote State Estimation","license":"http://creativecommons.org/publicdomain/zero/1.0/","headline":"","cross_cats":["math.OC"],"primary_cat":"cs.SY","authors_text":"Daniel E. Quevedo, Ling Shi, Subhrakanti Dey, Yuzhe Li","submitted_at":"2015-06-26T04:23:57Z","abstract_excerpt":"We consider a class of malicious attacks against remote state estimation. A sensor with limited resources adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance. A malicious attacker can modify the ACKs from the remote estimator and convey fake information to the sensor. When the capability of the attacker is limited, we propose an attack strategy for the attacker and analyze the corresponding effect on the estimation performance. The possible responses of the sensor are studied and a condition for the sensor to discard ACKs and switch fr"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.07955","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:59:01Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RvCnBEugqnAqizORrhhbaLRfRIdaalFEIogW7AQd0CkHKdYIr0ghZZ6DkGER2jkkNUcyGro20ASC5RVSDyhQAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T19:25:23.782974Z"},"content_sha256":"0e4f44b13b14ae2e528091eca16ea1b9cfc4e0a70ad074bffa02e7de4275b066","schema_version":"1.0","event_id":"sha256:0e4f44b13b14ae2e528091eca16ea1b9cfc4e0a70ad074bffa02e7de4275b066"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HJVT42Z3BOJN6P4N77RM3NPJ4Y/bundle.json","state_url":"https://pith.science/pith/HJVT42Z3BOJN6P4N77RM3NPJ4Y/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HJVT42Z3BOJN6P4N77RM3NPJ4Y/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T19:25:23Z","links":{"resolver":"https://pith.science/pith/HJVT42Z3BOJN6P4N77RM3NPJ4Y","bundle":"https://pith.science/pith/HJVT42Z3BOJN6P4N77RM3NPJ4Y/bundle.json","state":"https://pith.science/pith/HJVT42Z3BOJN6P4N77RM3NPJ4Y/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HJVT42Z3BOJN6P4N77RM3NPJ4Y/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:HJVT42Z3BOJN6P4N77RM3NPJ4Y","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"412c4884d94f7f08a7373c3093e93397184389f114a0b24943ab562efb5c128e","cross_cats_sorted":["math.OC"],"license":"http://creativecommons.org/publicdomain/zero/1.0/","primary_cat":"cs.SY","submitted_at":"2015-06-26T04:23:57Z","title_canon_sha256":"d8d5be74d0d5900f6faebfef870a32434c16cda1c24660f00b384785ac71109e"},"schema_version":"1.0","source":{"id":"1506.07955","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.07955","created_at":"2026-05-18T00:59:01Z"},{"alias_kind":"arxiv_version","alias_value":"1506.07955v1","created_at":"2026-05-18T00:59:01Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.07955","created_at":"2026-05-18T00:59:01Z"},{"alias_kind":"pith_short_12","alias_value":"HJVT42Z3BOJN","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_16","alias_value":"HJVT42Z3BOJN6P4N","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_8","alias_value":"HJVT42Z3","created_at":"2026-05-18T12:29:25Z"}],"graph_snapshots":[{"event_id":"sha256:0e4f44b13b14ae2e528091eca16ea1b9cfc4e0a70ad074bffa02e7de4275b066","target":"graph","created_at":"2026-05-18T00:59:01Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We consider a class of malicious attacks against remote state estimation. A sensor with limited resources adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance. A malicious attacker can modify the ACKs from the remote estimator and convey fake information to the sensor. When the capability of the attacker is limited, we propose an attack strategy for the attacker and analyze the corresponding effect on the estimation performance. The possible responses of the sensor are studied and a condition for the sensor to discard ACKs and switch fr","authors_text":"Daniel E. Quevedo, Ling Shi, Subhrakanti Dey, Yuzhe Li","cross_cats":["math.OC"],"headline":"","license":"http://creativecommons.org/publicdomain/zero/1.0/","primary_cat":"cs.SY","submitted_at":"2015-06-26T04:23:57Z","title":"Fake-Acknowledgment Attack on ACK-based Sensor Power Schedule for Remote State Estimation"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.07955","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9168c71ab2a3e376ad8718d07bda859815059296df5377b8eb2a6bb78d9b0714","target":"record","created_at":"2026-05-18T00:59:01Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"412c4884d94f7f08a7373c3093e93397184389f114a0b24943ab562efb5c128e","cross_cats_sorted":["math.OC"],"license":"http://creativecommons.org/publicdomain/zero/1.0/","primary_cat":"cs.SY","submitted_at":"2015-06-26T04:23:57Z","title_canon_sha256":"d8d5be74d0d5900f6faebfef870a32434c16cda1c24660f00b384785ac71109e"},"schema_version":"1.0","source":{"id":"1506.07955","kind":"arxiv","version":1}},"canonical_sha256":"3a6b3e6b3b0b92df3f8dffe2cdb5e9e6271dfe6b589418685dd39c0363832ba2","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3a6b3e6b3b0b92df3f8dffe2cdb5e9e6271dfe6b589418685dd39c0363832ba2","first_computed_at":"2026-05-18T00:59:01.701643Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:59:01.701643Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"y2JX1N3aPk9+yctDDX8In0AL/Ph1z/aM+50oejyntCbXVu92S7FLHoKcNp5wS93V8uIoqaez7SsP9ozTBDQmBA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:59:01.702172Z","signed_message":"canonical_sha256_bytes"},"source_id":"1506.07955","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9168c71ab2a3e376ad8718d07bda859815059296df5377b8eb2a6bb78d9b0714","sha256:0e4f44b13b14ae2e528091eca16ea1b9cfc4e0a70ad074bffa02e7de4275b066"],"state_sha256":"ba91bb42055cc977bc8e9f6caa8eacdb44cf393d6f107e484363dd47317696c6"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GmsXo1rRm1kyxrwImG5vRDz4YIt89dcPNFcRKjdLlnouhlJ4jX3qEIuKKb0XR2+YGRPv/iCYl58z3mtHCdQ2DQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T19:25:23.785016Z","bundle_sha256":"ebc3564343dd0f174511d6ecf962766c8575fb1c00084f3485330f2dbf395f5e"}}