Research Article

Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things

Algorithm 1

Initialize
repeat
Employ and order the fitness values of chicken using Equations ((10)) and ((11))
Isolate groups and select relations among chickens and hen using Equations ((12)), ((13)), and ((14))
Updating the chicken’s solution till chicken’s swarm find the better solutions using Equation ((15))
Memorizing the better solutions obtained so far
Until (Cycle = Max Cycle Numbers), Save best solutions
Assigning all networks input and outputs to DNN backpropagations
Initializing each weight from step 7
repeat
Presenting the patterns to the networks
Propagating the inputs forward through the networks
for all layers in the networks
for all nodes in the layers
Compute the weighted sum of the input to the nodes
Add threshold to the sum
Compute activation for the nodes
end
end
Propagating the error backwards through the networks
for all nodes in the output layers
Compute error signals
end
for all hidden layers
for all nodes in the layers
Compute node’s signal errors
Updating every node’s weighted in the networks
end
end
Compute Global Errors
Compute the Errors Function
end
While ((max numbers of iteration < than specified))