{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:47:02Z","timestamp":1762015622591,"version":"3.37.3"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571098","2019YFG0206","B14039"],"award-info":[{"award-number":["61571098","2019YFG0206","B14039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program","award":["61571098","2019YFG0206","B14039"],"award-info":[{"award-number":["61571098","2019YFG0206","B14039"]}]},{"DOI":"10.13039\/501100013314","name":"111 Project","doi-asserted-by":"crossref","award":["61571098","2019YFG0206","B14039"],"award-info":[{"award-number":["61571098","2019YFG0206","B14039"]}],"id":[{"id":"10.13039\/501100013314","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,3,14]]},"abstract":"<jats:p>Network function virtualization (NFV) is a new way to provide services to users in a network. Different from dedicated hardware that realizes the network functions for an IoT application, the network function of an NFV network is executed on general servers, and in order to achieve complete network functions, service function chaining (SFC) chains virtual network functions to work together to support an IoT application. In this paper, we focus on a main challenge in this domain, i.e., resource efficient provisioning for social IoT application oriented SFC requests. We propose an online SFC deployment algorithm based on the layered strategies of physical networks and an evaluation of physical network nodes, which can efficiently reduce bandwidth resource consumption (OSFCD-LSEM) and support the security and privacy of social IoT applications. The results of our simulation show that our proposed algorithm improves the bandwidth carrying rate, time efficiency, and acceptance rate by 50%, 60%, and 15%, respectively.<\/jats:p>","DOI":"10.1155\/2019\/4074272","type":"journal-article","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T23:31:44Z","timestamp":1552606304000},"page":"1-15","source":"Crossref","is-referenced-by-count":3,"title":["Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0734-9160","authenticated-orcid":true,"given":"Jian","family":"Sun","sequence":"first","affiliation":[{"name":"Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), UESTC, Chengdu, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Guanhua","family":"Huang","sequence":"additional","affiliation":[{"name":"Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), UESTC, Chengdu, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology, Tamil Nadu, India"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Guangyang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), UESTC, Chengdu, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.018"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.011"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700563"},{"issue":"12","key":"5","doi-asserted-by":"crossref","first-page":"12313","DOI":"10.1109\/TVT.2018.2876804","volume":"67","year":"2018","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.023"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.008"},{"year":"2017","key":"10"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851228"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.024"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2711610"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2879883"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474348"},{"journal-title":"IEEE Network Operations and Management Symposiu","first-page":"1","year":"2014","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.021"},{"issue":"4","key":"20","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1109\/TNSM.2017.2767100","volume":"14","year":"2017","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4599222"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"year":"2017","key":"24"},{"issue":"3","key":"28","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","year":"2009","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.002"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2861717"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1500494"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.018"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2477825"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2668470"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2477041"},{"journal-title":"Software Defined Networks for Future Networks and Services","first-page":"1","year":"2013","key":"36"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2580150"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355586"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.037"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.879659"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4074272.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4074272.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4074272.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T02:37:14Z","timestamp":1590028634000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/4074272\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":32,"alternative-id":["4074272","4074272"],"URL":"https:\/\/doi.org\/10.1155\/2019\/4074272","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,3,14]]}}}