Research Article

Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective

Algorithm 3

Evaluation of related nodes.
Input: SFC request;
  ;
  bool direction;
  X:   ;
Output: the node which has the minimum value of ;
Temp =
int i= 0;
  if  direction is true
i= X-1;
end if
  if  direction is false
i= X+1;
  end if
  for    do
if  
if  && && ;
Compute according to Equation (7);
if  < Temp
Temp = δ;
= ;
end if
end if
end if
  end for
  return  .