{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:YZWJQTW5Q73L6N45AM2GDRRS5L","short_pith_number":"pith:YZWJQTW5","canonical_record":{"source":{"id":"1807.04087","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CY","submitted_at":"2018-07-11T11:45:18Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"de0859af77fa9b1e141aecd48aa69b44178321660942cd35a0539c4da8184964","abstract_canon_sha256":"7e2f1b79faed8eb590b904bf044625f383d5c2d3c3ba2fdbf55ccddbad3db600"},"schema_version":"1.0"},"canonical_sha256":"c66c984edd87f6bf379d033461c632eacbc1dbda87e5c8bc388ae580c9a101b8","source":{"kind":"arxiv","id":"1807.04087","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1807.04087","created_at":"2026-05-18T00:10:58Z"},{"alias_kind":"arxiv_version","alias_value":"1807.04087v1","created_at":"2026-05-18T00:10:58Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1807.04087","created_at":"2026-05-18T00:10:58Z"},{"alias_kind":"pith_short_12","alias_value":"YZWJQTW5Q73L","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_16","alias_value":"YZWJQTW5Q73L6N45","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_8","alias_value":"YZWJQTW5","created_at":"2026-05-18T12:33:04Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:YZWJQTW5Q73L6N45AM2GDRRS5L","target":"record","payload":{"canonical_record":{"source":{"id":"1807.04087","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CY","submitted_at":"2018-07-11T11:45:18Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"de0859af77fa9b1e141aecd48aa69b44178321660942cd35a0539c4da8184964","abstract_canon_sha256":"7e2f1b79faed8eb590b904bf044625f383d5c2d3c3ba2fdbf55ccddbad3db600"},"schema_version":"1.0"},"canonical_sha256":"c66c984edd87f6bf379d033461c632eacbc1dbda87e5c8bc388ae580c9a101b8","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:10:58.033881Z","signature_b64":"cNuVDaWxUqWe2l0AtqlZDjJoaAq3YOWIXDk2Yzcilgwck+1RPvjFqXxxA131BlnqmISllfZtShJW4nf+raCQDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c66c984edd87f6bf379d033461c632eacbc1dbda87e5c8bc388ae580c9a101b8","last_reissued_at":"2026-05-18T00:10:58.033142Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:10:58.033142Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1807.04087","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:10:58Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"SrJIEHFk0oPMCusDkV1tnt6sEAGweE1hgGfL/1vOQJVLMifN7ukTo3R1M784batiaRzAY3+16Tr2YKREk29xCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T12:51:56.601660Z"},"content_sha256":"b136c4afd121cea5ee6ee9a724af439843da215e39ecf10a93c8db7bcd975291","schema_version":"1.0","event_id":"sha256:b136c4afd121cea5ee6ee9a724af439843da215e39ecf10a93c8db7bcd975291"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:YZWJQTW5Q73L6N45AM2GDRRS5L","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Internet of Things: Infrastructure, Architecture, Security and Privacy","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.NI"],"primary_cat":"cs.CY","authors_text":"Amirrudin Kamsin, Jawdat Alshaer, Mahdi H. Miraz, Mohammad Riyaz Belgaum, Nor Badrul Anuar, Safeeullah Soomro, Zainab Alansari","submitted_at":"2018-07-11T11:45:18Z","abstract_excerpt":"Internet of Things (IoT) is one of the emerging technologies of this century and its various aspects, such as the Infrastructure, Security, Architecture and Privacy, play an important role in shaping the future of the digitalised world. Internet of Things devices are connected through sensors which have significant impacts on the data and its security. In this research, we used IoT five layered architecture of the Internet of Things to address the security and private issues of IoT enabled services and applications. Furthermore, a detailed survey on Internet of Things infrastructure, architect"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1807.04087","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:10:58Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"FBHuHVtyRn03LZkHUSn9sMIoNrAcmBoELlUNnBJZ9ldYIONFSHA5j/UxAXOpUSPFqi91FJYTtZdkeodwdQUHDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T12:51:56.602399Z"},"content_sha256":"6f9b9a6fa0e0130c709584343e657f085d20cffe32528890572d452333467a42","schema_version":"1.0","event_id":"sha256:6f9b9a6fa0e0130c709584343e657f085d20cffe32528890572d452333467a42"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/YZWJQTW5Q73L6N45AM2GDRRS5L/bundle.json","state_url":"https://pith.science/pith/YZWJQTW5Q73L6N45AM2GDRRS5L/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/YZWJQTW5Q73L6N45AM2GDRRS5L/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T12:51:56Z","links":{"resolver":"https://pith.science/pith/YZWJQTW5Q73L6N45AM2GDRRS5L","bundle":"https://pith.science/pith/YZWJQTW5Q73L6N45AM2GDRRS5L/bundle.json","state":"https://pith.science/pith/YZWJQTW5Q73L6N45AM2GDRRS5L/state.json","well_known_bundle":"https://pith.science/.well-known/pith/YZWJQTW5Q73L6N45AM2GDRRS5L/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:YZWJQTW5Q73L6N45AM2GDRRS5L","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"7e2f1b79faed8eb590b904bf044625f383d5c2d3c3ba2fdbf55ccddbad3db600","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CY","submitted_at":"2018-07-11T11:45:18Z","title_canon_sha256":"de0859af77fa9b1e141aecd48aa69b44178321660942cd35a0539c4da8184964"},"schema_version":"1.0","source":{"id":"1807.04087","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1807.04087","created_at":"2026-05-18T00:10:58Z"},{"alias_kind":"arxiv_version","alias_value":"1807.04087v1","created_at":"2026-05-18T00:10:58Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1807.04087","created_at":"2026-05-18T00:10:58Z"},{"alias_kind":"pith_short_12","alias_value":"YZWJQTW5Q73L","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_16","alias_value":"YZWJQTW5Q73L6N45","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_8","alias_value":"YZWJQTW5","created_at":"2026-05-18T12:33:04Z"}],"graph_snapshots":[{"event_id":"sha256:6f9b9a6fa0e0130c709584343e657f085d20cffe32528890572d452333467a42","target":"graph","created_at":"2026-05-18T00:10:58Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Internet of Things (IoT) is one of the emerging technologies of this century and its various aspects, such as the Infrastructure, Security, Architecture and Privacy, play an important role in shaping the future of the digitalised world. Internet of Things devices are connected through sensors which have significant impacts on the data and its security. In this research, we used IoT five layered architecture of the Internet of Things to address the security and private issues of IoT enabled services and applications. Furthermore, a detailed survey on Internet of Things infrastructure, architect","authors_text":"Amirrudin Kamsin, Jawdat Alshaer, Mahdi H. Miraz, Mohammad Riyaz Belgaum, Nor Badrul Anuar, Safeeullah Soomro, Zainab Alansari","cross_cats":["cs.NI"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CY","submitted_at":"2018-07-11T11:45:18Z","title":"Internet of Things: Infrastructure, Architecture, Security and Privacy"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1807.04087","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:b136c4afd121cea5ee6ee9a724af439843da215e39ecf10a93c8db7bcd975291","target":"record","created_at":"2026-05-18T00:10:58Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"7e2f1b79faed8eb590b904bf044625f383d5c2d3c3ba2fdbf55ccddbad3db600","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CY","submitted_at":"2018-07-11T11:45:18Z","title_canon_sha256":"de0859af77fa9b1e141aecd48aa69b44178321660942cd35a0539c4da8184964"},"schema_version":"1.0","source":{"id":"1807.04087","kind":"arxiv","version":1}},"canonical_sha256":"c66c984edd87f6bf379d033461c632eacbc1dbda87e5c8bc388ae580c9a101b8","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c66c984edd87f6bf379d033461c632eacbc1dbda87e5c8bc388ae580c9a101b8","first_computed_at":"2026-05-18T00:10:58.033142Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:10:58.033142Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"cNuVDaWxUqWe2l0AtqlZDjJoaAq3YOWIXDk2Yzcilgwck+1RPvjFqXxxA131BlnqmISllfZtShJW4nf+raCQDg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:10:58.033881Z","signed_message":"canonical_sha256_bytes"},"source_id":"1807.04087","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:b136c4afd121cea5ee6ee9a724af439843da215e39ecf10a93c8db7bcd975291","sha256:6f9b9a6fa0e0130c709584343e657f085d20cffe32528890572d452333467a42"],"state_sha256":"604e6ba1f07196bb37a9bb6f8b94109cf7560c986f8b90eeb46ca1d72364e294"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1DfdoDLwYcC8hqZHTc48xOqnhvCxIcXnuaXnblEgtbqfwlDe4Ba/wiFVP7SzvQ6UOR7EmSo/1jSXf1ILYIpRDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T12:51:56.605810Z","bundle_sha256":"9c870d9ea5540116ab923d96488a0d089f9d9535e525f3cbbba1308e82692088"}}