Implementation of Data Integrity using MD5 and MD2 Algorithms in IoT Devices

Authors

  • Sandeep K V, Dr. Sayed Abdulhayan

Abstract

It is important that the data received by the IoT device is legit so that it can process the data and provide correct output that is necessary for the other stages of a system dependent on the output, to work smoothly. This is where data integrity is put into effect. In order to check the legitimacy, precision and authenticity of the data, a technique called hashing is used. This hashing can be done by using the Secure Hash Algorithm version (SHA) and Message Digest version (MD). MD5 algorithm is implemented by building block chains using python in which various functions like hash H(x) and verify( ) are used for verification of data. Block chains are nothing but a data structure that holds transactional records or in simplem terms, it is a chain of blocks that holds information. A block chain is built because it is resistant to any kind of modifications to the data making it helpful to check integrity of data. Also MD2 Integrity Algorithm is implemented to check the Integrity status of Message data after being transferred from IoT transmitter to IOT receiver using Wi-Fi Communication Technology.

Downloads

Downloads

Published

2020-11-02 — Updated on 2021-02-12

Versions

How to Cite

Sandeep K V, Dr. Sayed Abdulhayan. (2021). Implementation of Data Integrity using MD5 and MD2 Algorithms in IoT Devices. PalArch’s Journal of Archaeology of Egypt / Egyptology, 17(7), 7388 - 7395. Retrieved from https://archives.palarch.nl/index.php/jae/article/view/3155 (Original work published November 2, 2020)