Research Article

Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective

Figure 6

Simulation results for the US-Net network.
(a) The resource capacity of each layer
(b) The detailed information of nodes in L.4