Research Article

Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective

Figure 5

Simulation results for the moderate-scale network.
(a) The resource capacity of each layer
(b) The information of the physical nodes in L.8