Research Article

Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective

Figure 4

Two real network topologies used in our simulations.
(a) US-Net topology
(b) China-Net topology