Research Article
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective
Input: SFC request. physical network; | Output: SFC deployment scheme. | Receive a user request; | Initialize Path = ; | Path; = ; | Layer the topology: Algorithm 2(; ; ); | Get : the layers that destination client belongs to; | while do | if max = | = Algorithm 3(; ; true; max); | Path; | = ; | else | = Algorithm 3(; ; false; max); | Path; | = ; | end if | = - 1; | VNF ; | Algorithm 2(; ; ); | Update ; | end while | if ≤ max | Select min L.X && L.X > ; | while Path do | = Algorithm 3 (; ; true; L.X); | Path; | = ; | L.X = L.X - 1; | VNF; | end while | end if | SFC deployment scheme is Path. |
|