{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:MXEP2UMEV5LBWBMKSZHPPIMGKU","short_pith_number":"pith:MXEP2UME","canonical_record":{"source":{"id":"1408.3575","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-08-13T03:31:32Z","cross_cats_sorted":[],"title_canon_sha256":"493d3c6335eef82d96d1ec47b1dc2351dc678393ab37263f46a8b17b26ce3cde","abstract_canon_sha256":"d9faeffd6e9fc006ad3707adbecb432882f1cf724269da16d89f4601b93c1c43"},"schema_version":"1.0"},"canonical_sha256":"65c8fd5184af561b058a964ef7a186552529b710ebb5c6e21bd9ab2b4259ddb3","source":{"kind":"arxiv","id":"1408.3575","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1408.3575","created_at":"2026-05-18T02:45:05Z"},{"alias_kind":"arxiv_version","alias_value":"1408.3575v1","created_at":"2026-05-18T02:45:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1408.3575","created_at":"2026-05-18T02:45:05Z"},{"alias_kind":"pith_short_12","alias_value":"MXEP2UMEV5LB","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_16","alias_value":"MXEP2UMEV5LBWBMK","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_8","alias_value":"MXEP2UME","created_at":"2026-05-18T12:28:38Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:MXEP2UMEV5LBWBMKSZHPPIMGKU","target":"record","payload":{"canonical_record":{"source":{"id":"1408.3575","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-08-13T03:31:32Z","cross_cats_sorted":[],"title_canon_sha256":"493d3c6335eef82d96d1ec47b1dc2351dc678393ab37263f46a8b17b26ce3cde","abstract_canon_sha256":"d9faeffd6e9fc006ad3707adbecb432882f1cf724269da16d89f4601b93c1c43"},"schema_version":"1.0"},"canonical_sha256":"65c8fd5184af561b058a964ef7a186552529b710ebb5c6e21bd9ab2b4259ddb3","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:45:05.452769Z","signature_b64":"4DRd7ZQvuKGL8ktAmg+izeT7bPGyF+N9UriIeGuRHyADzOpYFJhzOc93+SK0V/SDENkUdE0OjQJfqa+70tjhBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"65c8fd5184af561b058a964ef7a186552529b710ebb5c6e21bd9ab2b4259ddb3","last_reissued_at":"2026-05-18T02:45:05.452120Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:45:05.452120Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1408.3575","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:45:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"v+xeSqqHIIl70CwsWGFqyux2D83+4nh09lx/9U0geTkAltHnN1xgI3hHErkLLU6IN2lGQ12y7+Qz/nXSfYk7Dg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T08:18:57.865544Z"},"content_sha256":"b253377d8a6e40e045605e9857b4c94df400f265bb385bf50f101ff110fa81c9","schema_version":"1.0","event_id":"sha256:b253377d8a6e40e045605e9857b4c94df400f265bb385bf50f101ff110fa81c9"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:MXEP2UMEV5LBWBMKSZHPPIMGKU","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Secure Multipath Routing Scheme using Key Pre-Distribution in Wireless Sensor Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"A. K. Verma, Kamal Kumar, R. B. Patel","submitted_at":"2014-08-13T03:31:32Z","abstract_excerpt":"Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the attacker efforts by many folds. We propose to build a subset of neighbors as our front towards d"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1408.3575","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:45:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Ku3L3xOgjI6VyUXAAjKQSPN+9d8kAwEdzmm87YHQxd2dGuHIU1mBmONO0vKX64KmUeEd/0YZUknf3V7+kShNBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T08:18:57.866175Z"},"content_sha256":"65e189063cfbf93e68b8e7bf99a9959b71b60bd55f5e9ef2d5ad7cd5e2b1f6cc","schema_version":"1.0","event_id":"sha256:65e189063cfbf93e68b8e7bf99a9959b71b60bd55f5e9ef2d5ad7cd5e2b1f6cc"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MXEP2UMEV5LBWBMKSZHPPIMGKU/bundle.json","state_url":"https://pith.science/pith/MXEP2UMEV5LBWBMKSZHPPIMGKU/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MXEP2UMEV5LBWBMKSZHPPIMGKU/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T08:18:57Z","links":{"resolver":"https://pith.science/pith/MXEP2UMEV5LBWBMKSZHPPIMGKU","bundle":"https://pith.science/pith/MXEP2UMEV5LBWBMKSZHPPIMGKU/bundle.json","state":"https://pith.science/pith/MXEP2UMEV5LBWBMKSZHPPIMGKU/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MXEP2UMEV5LBWBMKSZHPPIMGKU/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:MXEP2UMEV5LBWBMKSZHPPIMGKU","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"d9faeffd6e9fc006ad3707adbecb432882f1cf724269da16d89f4601b93c1c43","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-08-13T03:31:32Z","title_canon_sha256":"493d3c6335eef82d96d1ec47b1dc2351dc678393ab37263f46a8b17b26ce3cde"},"schema_version":"1.0","source":{"id":"1408.3575","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1408.3575","created_at":"2026-05-18T02:45:05Z"},{"alias_kind":"arxiv_version","alias_value":"1408.3575v1","created_at":"2026-05-18T02:45:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1408.3575","created_at":"2026-05-18T02:45:05Z"},{"alias_kind":"pith_short_12","alias_value":"MXEP2UMEV5LB","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_16","alias_value":"MXEP2UMEV5LBWBMK","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_8","alias_value":"MXEP2UME","created_at":"2026-05-18T12:28:38Z"}],"graph_snapshots":[{"event_id":"sha256:65e189063cfbf93e68b8e7bf99a9959b71b60bd55f5e9ef2d5ad7cd5e2b1f6cc","target":"graph","created_at":"2026-05-18T02:45:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the attacker efforts by many folds. We propose to build a subset of neighbors as our front towards d","authors_text":"A. K. Verma, Kamal Kumar, R. B. Patel","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-08-13T03:31:32Z","title":"Secure Multipath Routing Scheme using Key Pre-Distribution in Wireless Sensor Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1408.3575","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:b253377d8a6e40e045605e9857b4c94df400f265bb385bf50f101ff110fa81c9","target":"record","created_at":"2026-05-18T02:45:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"d9faeffd6e9fc006ad3707adbecb432882f1cf724269da16d89f4601b93c1c43","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-08-13T03:31:32Z","title_canon_sha256":"493d3c6335eef82d96d1ec47b1dc2351dc678393ab37263f46a8b17b26ce3cde"},"schema_version":"1.0","source":{"id":"1408.3575","kind":"arxiv","version":1}},"canonical_sha256":"65c8fd5184af561b058a964ef7a186552529b710ebb5c6e21bd9ab2b4259ddb3","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"65c8fd5184af561b058a964ef7a186552529b710ebb5c6e21bd9ab2b4259ddb3","first_computed_at":"2026-05-18T02:45:05.452120Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:45:05.452120Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"4DRd7ZQvuKGL8ktAmg+izeT7bPGyF+N9UriIeGuRHyADzOpYFJhzOc93+SK0V/SDENkUdE0OjQJfqa+70tjhBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T02:45:05.452769Z","signed_message":"canonical_sha256_bytes"},"source_id":"1408.3575","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:b253377d8a6e40e045605e9857b4c94df400f265bb385bf50f101ff110fa81c9","sha256:65e189063cfbf93e68b8e7bf99a9959b71b60bd55f5e9ef2d5ad7cd5e2b1f6cc"],"state_sha256":"bc13af20ce5a5491e9a73083d4b18f38cd05d921c03c4be623f79554d7f682be"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"izcCTSOCbK6Kmtdi53X7c5XH3vWT3n9HN7gcyirrcoiTx+S3efX0ywIoOg7/MLkEDIhbyiwo6smfkZmWtGtlAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T08:18:57.870000Z","bundle_sha256":"3adcfb6ba20fd1065182d05c26a10cd5fcbdfd104b2d26174246bc9f6c2fc80c"}}