Research Article
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective
Figure 5
Simulation results for the moderate-scale network.
(a) The resource capacity of each layer |
(b) The information of the physical nodes in L.8 |