Research Article

Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective

Algorithm 2

Network layered processing.
Input: ; ; physical network G.
Output: ;
   ;   = L.1;
  for ;   ; do
for each ; do
if    &&  
;
else if    &&  && =
;
end if
end for
++;
  end for
  for  L.X  ≤  ; do
for  ; do
;
= .1;
for   ; do
if  &&&&
;
end if
++;
end for
end for
  end for
  return