This is an outdated version published on 2020-11-02. Read the most recent version.

Implementation of Data Integrity using MD5 and MD2 Algorithms in IoT Devices

Authors

  • Sandeep K V, Dr.Sayed Abdulhayan

Abstract

It is important that the data received by the IoT device is legit so that it can process the
data and provide correct output that is necessary for the other stages of a system dependent on
the output, to work smoothly. This is where data integrity is put into effect. In order to check the
legitimacy, precision and authenticity of the data, a technique called hashing is used. This
hashing can be done by using the Secure Hash Algorithm version (SHA) and Message Digest
version (MD). MD5 algorithm is implemented by building block chains using python in which
various functions like hash H(x) and verify( ) are used for verification of data. Block chains are
nothing but a data structure that holds transactional records or in simple terms, it is a chain of
blocks that holds information. A block chain is built because it is resistant to any kind of
modifications to the data making it helpful to check integrity of data. Also MD2 Integrity
Algorithm is implemented to check the Integrity status of Message data after being transferred
from IoT transmitter to IOT receiver using Wi-Fi Communication Technology

Downloads

Downloads

Published

2020-11-02

Versions

How to Cite

Sandeep K V, Dr.Sayed Abdulhayan. (2020). Implementation of Data Integrity using MD5 and MD2 Algorithms in IoT Devices. PalArch’s Journal of Archaeology of Egypt / Egyptology, 17(7), 7388 - 7395. Retrieved from https://archives.palarch.nl/index.php/jae/article/view/3155