Open Access iconOpen Access



Ensuring Information Security in Smart Door Lock Systems Using the Cuckoo Search Algorithm

Arkan Kh Shakr Sabonchi1,*, Zainab Hashim Obaid2

1 Department of Mathematics, Open Educational College, Kirkuk Branch, Kirkuk, 36001, Iraq
2 Mutafaweqat High School for Girls, Kirkuk Branch, Kirkuk, 36001, Iraq

* Corresponding Author: Arkan Kh Shakr Sabonchi. Email: email

Journal of Cyber Security 2022, 4(4), 269-286.


The widespread use of Internet of Things (IoT) devices, such as smart appliances, phones, and watches, has brought about concerns regarding security and privacy. With the increasing prevalence of cyberattacks from both malicious and non-malicious sources, security has become a critical factor in the design of IoT systems. In particular, data security poses a significant challenge due to the growing amount of data stored in IoT systems. Inadequate security measures can allow hackers to take over IoT devices remotely, resulting in significant damage. To address these concerns and improve the security of IoT-based smart door lock systems, this research proposes utilizing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC). The proposed design employs CS to generate the ECC private key, which can enhance data storage security in IoT systems. The study evaluates the proposed design in terms of encoding and decoding times and compares it with other encoding techniques such as (ECC-GA-SHA-256) and (ECC-FA-SHA-256). The results show that the proposed design achieves better encoding times with 125 iterations and better decoding times with 175 iterations. Furthermore, the proposed design has encoding and decoding times faster than other encoding techniques by more than 15.17%. These findings suggest that the proposed design can significantly enhance the security and performance of IoT-based smart door lock systems. The utilization of CS, SHA-256, and ECC can serve as promising methods to address the security challenges associated with IoT-based smart door lock systems.


Cite This Article

A. K. S. Sabonchi and Z. H. Obaid, "Ensuring information security in smart door lock systems using the cuckoo search algorithm," Journal of Cyber Security, vol. 4, no.4, pp. 269–286, 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 454


  • 330


  • 1


Share Link