Research Article
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective
Figure 6
Simulation results for the US-Net network.
(a) The resource capacity of each layer |
(b) The detailed information of nodes in L.4 |