Secured IoT Through Hashing Using MD5

With the boom of Internet of Things, the embedded devices are being able to connect to the internet and intercommunicate with each other. Internets of Things find many applications in various fields but the emergence of IoT have put the embedded device communication and interaction at risk. There are various security conditions that need to be satisfied to be able to securely connect the embedded device to the internet. MD5 is a hashing algorithm which outputs a message digest which is of fixed length derived from an input of arbitrary length. It has various features that can be used to satisfy the security concern in IoT. The system is proposed to allow the use of MD5 for securing the embedded device from attacks when connected to the internet to become a part of the Internet of Things. A prologue to the embedded system and Internet of Things has been given. The various features that a security algorithm needs to fulfil have been discussed. By keeping this as the base, the proposed system's compatibility and fulfilment with the required features was checked and the final conclusion of using MD5 in Embedded System for securing IoT was arrived.

[1]  Mangal Sain,et al.  Survey on security in Internet of Things: State of the art and challenges , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[2]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[3]  Zhao Yong-Xia,et al.  MD5 Research , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[4]  Amala V. Rajan,et al.  Internet of Things (IoT): Application systems and security vulnerabilities , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[5]  Mark Mohammad Tehranipoor,et al.  Security validation in IoT space , 2016, 2016 IEEE 34th VLSI Test Symposium (VTS).

[6]  B. K. Mishra,et al.  Hardware based MD5 implementation using VHDL for secured embedded and VLSI based designs , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).

[8]  Young-Gab Kim,et al.  Security Requirements Analysis for the IoT , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).