You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

1 June 2023

Survivability Mapping Strategy for Virtual Wireless Sensor Networks for Link Failures in the Internet of Things

,
,
,
,
and
1
State Grid Chongqing Electric Power Research Institute, Chongqing 401123, China
2
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Broadband Wireless Transmission and Networks: Latest Advances and Prospects

Abstract

In the case of virtual wireless sensor networks, a link-failure-oriented survivable virtual sensor network mapping algorithm (F-SVNE) is proposed to address the issue of link failure in the underlying wireless sensor network. First, the algorithm utilizes the fast routing strategy and creates a backup route set based on a multi-path selection algorithm to reduce the delay in fault recovery caused by path selection. Second, the survivable virtual sensor network mapping algorithm is adopted based on the routing set. Finally, in the mapping stage, the efficiency and reliability of the algorithm are comprehensively considered, and the path with the largest survival probability is selected from the backup route set of the faulty link to remap the virtual link affected by the link failure. Empirical results demonstrate that the F-SVNE algorithm can efficaciously lessen the failure recovery delay, and improve the long-term average revenue–cost ratio and average failure recovery rate.

1. Introduction

With the desires of users of Internet of Things (IoT) applications continuing to grow, different application scenarios and business requirements have shown disparate performance indicators for IoT. The Wireless Sensor Network (WSN), which serves as the underlying sensing device of IoT, is typically deployed randomly in unattended areas and harsh environments to perform various complex tasks. Moreover, WSN plays an important role in smart cities, medical monitoring, intrusion detection, and emergency response fields []. However, the deployment of WSN is oriented around a specific domain and single user, resulting in the flexibility and scalability of task execution being greatly limited, which leads to the resource utilization of sensor nodes being less than 20%; they are therefore unable to meet the different Quality of Service (QoS) requirements of diverse applications. Traditional software embedding schemes that add new application components to the existing network architecture can cause the existing network architecture to become cumbersome and rigid. However, network virtualization technology [,,] can effectively solve the above problem, and has the significant economic benefits (such as reduced investment and operating costs) of leasing resources (sensing services) to interested third parties. Network virtualization technology also provides the ability to rapidly configure and recover physical network resources from failure, as well as scale on demand. To enhance the potential of IoT, Virtual Sensor Network (VSN) technology for multi-task resource sharing was conceived of, in order to improve the effective use of sensing resources through the multi-user sharing of large heterogeneous sensing infrastructure resources.
Currently, virtualized WSN can be decoupled into two parts: the Wireless Sensor Network Infrastructure Provider (WSNInP) and the Virtual Sensor Network Service Provider (VSNSP) by means of the mode of node-level and network-level virtualization. WSNInP takes charge of the deployment and maintenance of WSN, while VSNSP needs to lease sensors from WSNInP to perform sensing tasks to acquire sensing data and create a Virtual Sensor Network Request (VSNR) to provide corresponding services to users []. The VSNR coordinates and collaborates with multiple VSNs through the mode of resource reuse, and each VSN has a certain application and performance level, which can relieve the issues of the low resource utilization and poor scalability of sensing nodes in the current WSN.
Each VSNR constitutes virtual sensor nodes that need to be mapped to the physical sensor nodes of the underlying WSN in order to provide services to users, and the same is true for links. However, current IoT mapping algorithms mostly assume the absence of physical failures [], and they optimize the network model to improve resource utilization and increase revenue, but ignore the issue of link failures caused by the wireless communication characteristics of WSNs. Network virtualization enables the reuse and sharing of physical resources;however, it also introduces the problem of many virtual links failing due to the failure of a physical link, leading to the failure of multiple VSNs. When VSN requests arrive, the WSNInP needs to undertake the offset in the Service Level Agreement (SLA), which may cause significant economic and reputational losses to the WSNInP that leases the affected physical link. Therefore, while efficiently and reasonably mapping VSN, it is necessary to provide fault tolerance mechanisms for the tasks carried by VSNs, to ensure quick recovery to normal operation in case of network failures, maintain continuity of network services, and ensure the survivability of the VSN.
Currently, research on survivability mapping for virtualized WSNs is scarce and primarily focuses on scenarios involving physical node or single link failures. Given these limitations, this study specifically addresses the issue of link failures, particularly in scenarios involving multi-link failures. To tackle this challenge, an algorithm called the Survivable Virtual Network Embedding Algorithm for Link Failures (F-SVNE) is proposed in this paper. The contributions and innovations of this paper are as follows:
  • A fast routing policy is established and a multi-path selection algorithm is used for physical link faults to establish a backup routing set for each physical link to reduce the fault recovery delay.
  • A failure probability model is established to calculate the survival probability of the underlying links. Taking into account virtual network mapping cost and survival probability, the path with the maximum survival probability is selected from the backup routing set of faulty links to remap the virtual links affected by link failures.
The main body of this paper is divided into seven sections. The first section is the introduction, which describes the research background and contributions of virtualized WSN. The second section is the related work, which describes the current research status and existing problems of WSN. The third section deals with problem modeling for virtualized WSNs. The fourth section is the virtual network multi-link fault recovery strategy, including the construction of backup routes, the link survivability probability model and link remapping. The fifth section provides the simulation analysis, firstly by describing the parameter settings, and then showing the simulation results and result analysis. The sixth and seventh sections are the discussion and conclusion sections, respectively, summarizing the contributions and future developments of this research.

3. System Modeling and Problem Modeling

3.1. Network Model

The architecture of virtualized wireless sensor networks is demonstrated in Figure 1: the infrastructure layer, the network services layer, and the application layer are part of the network. The infrastructure layer consists of a dense distribution of various types of sensor nodes that provide perceptual data and forward data services for theoreticality. The network services layer abstracts the physical resources and forms corresponding VSNs based on different user-requested tasks. Finally, each VSN is migrated and isolated to effectively coordinate multiple applications for sensing tasks. The application layer is responsible for receiving user-requested tasks and attaching the necessary QoS requirements. Table 2 lists all key symbols and their meanings for easy understanding.
Figure 1. The architecture of virtualized wireless sensor network.
Table 2. Key symbol.
The underlying physical network is expressed by an undirected graph G S = ( N S , L S ) , where N S = n 1 s , n 2 s , , n m s is the sensor node set, c n i s represents the CPU computing capability of the sensor node, l o c n i s denotes the geographical location of the sensor node, and L S = l i j n i s , n j s N S indicates a physical link set, l i j indicates the physical link between the corresponding sensor node pair n i s , n j s on the physical network. The transmissibility of the homologous communication link between node pairs n i s , n j s is b l i j s , the path set between the source nodes n i s and the sink node is P n i s S , in the physical network.
VSN is still expressed using an undirected graph G V = ( N V , L V ) , where N V and L V virtual nodes and link sets. Since different VSN requests correspond to different services, the degree of demand for resources is also different. For any virtual node, n i v N V , c n i v indicates the computational capability of the virtual node request of n i v . l o c n i v indicates the sensing position of the virtual node n i v . According to the location requested by each user, physical sensor nodes are selected within the one-hop communication range to perform sensing tasks. For any virtual link l v L V , the demanded transmission rate is b l i j v , and the physical path is a route from the source to the sink node after the link is mapped.

3.2. Objective Function

For VSNR, the computing and storage resources required by virtual sensor nodes are fixed and do not vary with different physical sensing nodes, while the resource consumption of virtual links varies greatly with different physical mapping paths. Therefore, when mapping virtual sensor networks, minimizing link resource consumption should be considered. The objective function is calculated as follows:
min n i v = 1 N V n j s N S , l j b s L S r n i v , n j s × b l j b s + s l j b s
The constraint is as follows:
n i v N V r n i v , n i s = 1 , n i s N S
r n i v , n i s × c n i v R c n i s , n i s N S , n i v N V
f i j a b × b l i j v R b l a b s , n i s N S , n i v N V
l o c n i v l o c n i s D 0 , n i s N S , n i v N V
where r n i v , n i s and f i j a b are used as decision variables for node and link mapping, respectively, if the virtual space node n i v is successfully mapped to the physical space as n j s , r n i v , n i s = 1 ; otherwise, r n i v , n i s = 0 . Similarly, if the virtual link l i j v is mapped to a physical link l a b s , f i j a b = 1 ; otherwise, f i j a b = 0 . b ( l j b s ) and s l j b s indicate the communication resources consumed by the working link and the recovery link, respectively. Equation (2) is a node independence constraint, indicating that the same physical space node cannot be mapped to virtual space nodes from the same VSN. Equation (3) represents the computational capability constraint requested by the virtual space node. When the virtual space node performs node mapping, the residual computational datums of the chosen candidate mapping the reliability of space nodes should exceed the processing power of by the virtual node. Similarly, Equation (4) shows the link communication datum constraint of the virtual network. Equation (5) is the geographical location constraint demanded by the virtual node, that is, the geographical location demanded by the virtual node must be within the one-hop communication range of the mapped physical node.

3.3. Evaluation Index

In this paper, we employ five metrics of the VNE algorithm principally to evaluate the effectiveness of the algorithm, including long-term average revenue, long-term resource consumption cost, revenue cost ratio, virtual network request acceptance rate, and failure recovery success rate []. These metrics collectively provide a comprehensive assessment of the algorithm’s performance in terms of revenue generation, resource utilization, cost-effectiveness, and network reliability. The long-term average revenue–cost ratio means that the revenue of a virtual network request at time t is defined as its required resources, and the cost of accepting this virtual network request at time t is defined as its total physical resource consumption. The long-term resource consumption cost, and the revenue of WSNInP depends on the service time t requested by the VSN and the underlying WSN resources required; thus, the long-term revenue–cost ratio of WSNInP is the ratio of its long-term revenue to long-term cost within a given period, t. In order to improve the long-term benefits of WSNInP, it is necessary to consider the trade-off between the benefits of VSNR being successfully mapped and the penalty to be paid due to the failure of VSNR as a result of the failure of the underlying WSN. The virtual network request acceptance rate is an effective performance index that is used to measure the mapping efficiency of the algorithm. The larger the value, the higher the utilization rate of the underlying WSN resources, and the higher the benefits for WSNInP. The failure recovery success rate is the ratio of the number of VSN requests successfully recovered within a period to the total number of VSN requests that fail due to the failure of the underlying WSN. In addition, this paper uses the virtual network request acceptance rate and failure recovery success rate to evaluate the virtual sensor network.
The revenue of WSNInP is measured in terms of CPU resources expended by the virtual sensor network of IoT and communication link transfer rate resources, which are calculated as follows:
R ( G V ) = n i v N V c ( n i v ) + l i j v L V b ( l i j v )
The long-term average return of WSNInP can be acquired from Equation (7), which is calculated as follows:
R = lim T t = 0 T i = 1 V S N R = R ( G V , t ) T
where t = 0 T i = 1 V S N R = R ( G V , t ) represents the revenue from successfully mapping VSNR in the period T .
The resource consumption cost of WSNInP is the sum of CPU resources and communication link transmission rate resources, which is calculated as:
C ( G V ) = n i v N V c ( n i v ) + l i j v L V b ( l i j v ) × h o p n i v , n i s
where h o p n i v , n i s indicates the quantity of hops from the physical sensor node n i s to the sink node after a virtual node n i v is mapped to the physical sensor node n i s .
Equations (9) and (10) can calculate the long-term average revenue-cost ratio, which can be calculated as:
R / C = lim T t = 0 T i = 1 V S N R R ( G V , t ) t = 0 T i = 1 V S N R C ( G V , t )
During the VNE, if a physical link fails and the link fails to recover, the WSNInP shall bear the penalty S G V specified in the SLA, which is computed as:
S G V = ω R ( G V )
where ω is the penalty factor.
Therefore, the long-term average revenue-cost ratio is newly computed as:
R / C = lim T t = 0 T i = 1 V S N R R ( G V , t ) t = 0 T i = 1 F B S ( G V , t ) t = 0 T i = 1 V S N R C ( G V , t )
where F B represents the physical links that fail and are not repaired within the period T .
Assume that the quantity of all VSNRS is G n u m V and the quantity of VSNRS accepted after mapping is G a c c V . Therefore, the acceptance rate of VSNR is computed as:
a c c = lim T t = 0 T G a c c V t = 0 T G n u m V
The success rate of fault recovery is stipulated as the ratio of the quantity of VSNR requests that are successfully repaired from the initial time to time t to the sum total of VSNR asks that are invalid due to physical network faults. The ratio is calculated as:
r = lim T t = 0 T G r e cov e r e d V t = 0 T G f a i l e d V

5. Experiments and Analysis

5.1. Setting

In this chapter, Matlab R2018b is applied to verify the performance of the proposed algorithm. In the simulation experiment, VSNR arriving offline is considered in this paper. So as to realistically simulate the physical network, WSN is composed of 50 evenly distributed sensor nodes, the transmission radius of every last sensor node is 30 m, and the CPU resources of every last sensor node are evenly distributed [100, 200]. The link capacity between sensor nodes is evenly distributed [80, 100]. The arrival of link faults obeys the Poisson distribution with a parameter of 0.05 and a candidate set hop count of 4.
VSNR arrives according to Poisson distribution, and its effective reach is 8 arrivals per 100-time units. The service time of each VSNR obeys an exponential distribution, with an expectation of 100-time units. The magnitude of each virtual node is subject to the uniform allocation [3, 5], the CPU resources requested by the virtual node are subject to the uniform allocation [10, 20], and the link resources requested are subject to the uniform allocation [10, 25]. All cost and benefit parameters in VSNR are set to 1. Each simulation lasted 50,000-time units, and the simulation was executed 10 times in total. The average evaluation index was taken as the eventual experimental result to eliminate the influence of random factors. The specific simulation settings are shown in Table 3.
Table 3. Parameter settings.
This paper extends the classical two-stage mapping algorithm [] to the C-SVNE algorithm, applied to the link failure environment as the benchmark comparison algorithm, due to the imperfect research on link failure survivability in virtualization WSN. The algorithm experiment settings in [,] include four layers, namely the physical layer, access layer, sensor virtualization layer and application layer, but the algorithm in this paper has a three-layer structure, including the infrastructure layer, network service layer and application layer. In addition, based on reference [], the link failure recovery algorithm N-SVNE in reference [] is adopted as a further comparison algorithm for F-SVNE. The specific comparison is shown in Table 4.
Table 4. Simulation algorithm feature comparison.

5.2. Main Results

In Figure 2 and Table 5, the trend of the VSNR acceptance rate over time for three comparison algorithms is shown. It can be seen that the acceptance rate of VSNR in the comparison algorithms begins to drop from 1 over time and eventually tends to become stable in dynamic equilibrium. In the initial stage of virtual network mapping, the nodes and links in the underlying physical WSN have rich resources, so the initial three algorithms have a high acceptance rate. As the underlying physical network resources occupied by previous VSNR requests increase, physical WSN resources are reduced, resulting in some VSNRs being rejected due to insufficient resources. The VSNRF-SVNE algorithm proposed in this paper finally accepts a rate that is steady at around 0.73, which is higher than that of other algorithms. This is because, during the node mapping stage, the F-SVNE algorithm, using the measurement of activity index, leads the task of physical nodes bearing selection to be relatively balanced, and the contrast algorithm is preferred in current physical network resources of nodes and links. As a result, a large number of key nodes and links are rapidly occupied, and subsequent VSN mapping fails.
Figure 2. Acceptance rate of VSNR.
Table 5. Acceptance rate of VSNR.
In Figure 3 and Table 6, the average failure recovery rate for three comparison algorithms is shown. It can be seen that the average failure recovery rate of the comparison algorithms gradually decreases and tends to become stable with time. In the initial phase of virtual mapping the resources in the physical network are sufficient to recover faulty links. As the number of VSNRs increases, a large amount of underlying physical resources become occupied and the resources used for fault recovery decrease. As a result, the average fault recovery rate decreases. Among them, the F-SVNE average recovery rate is the highest. This is because the algorithm uses multiple path selection algorithms for backup routing collection, a collection of backup paths meets the resource constraints, and the priority use of link resources balances the large backup paths. Fragmentation occurs when reducing resources, the remaining backup resources are optimized at the same time, and the average recovery rate increases. The reason that C-SVNE has the lowest average failure recovery rate is that when a link failure occurs, it adopts the shortest path algorithm to recover the link failure. As the remaining available resources of the underlying physical network gradually decrease, it cannot discover the appropriate communication route for remapping the faulty link.
Figure 3. VSNR failure recovery rate.
Table 6. VSNR failure recovery rate.
In Figure 4 and Table 7, the average failure recovery delay for three comparison algorithms is shown. It can be seen that the C-SVNE algorithm has the longest average failure recovery delay, while the N-SVNE and F-SVNE algorithms have shorter average failure recovery delays. The longer average failure recovery delay of the C-SVNE algorithm is due to the fact that it does not have any backup link sets. When a physical link fails, the algorithm needs to spend additional time choosing an appropriate link for remapping on account of the remaining physical resources. On the other hand, both the N-SVNE and F-SVNE algorithms create backup link sets for physical links, which saves time for link remapping. Among the two algorithms with backup link sets, the F-SVNE algorithm exhibits the shortest average failure recovery delay. This is because the F-SVNE algorithm selects backup paths with a large link resource balance for virtual link remapping, which further shortens the path selection time and reduces the average failure recovery delay. In summary, the F-SVNE algorithm achieves the shortest average failure recovery delay among the three algorithms, followed by the N-SVNE algorithm, while the C-SVNE algorithm has the longest average failure recovery delay on account of the absence of backup link sets.
Figure 4. Fault recovery delay.
Table 7. Fault recovery delay.
In Figure 5 and Table 8, the long-term average revenue-cost ratio for three comparison algorithms is shown. From the diagram, we can observe that the long-term average cost of the three algorithms gradually decreases over time and reaches a stable state. This is because as a large number of physical network resources are being used, some physical link failures cannot be restored due to insufficient resources, resulting in lower average income than cost for a prolonged period, and a dynamic balance in a steady state is eventually achieved. The long-term average revenue-cost ratio of the F-SVNE algorithm is consistently higher than that of the other two algorithms, and finally stabilizes at around 0.6. This is because, on one hand, the F-SVNE algorithm reduces the fragmentation of physical resources, optimizes the remaining backup resources, and improves the acceptance rate of VSNRs, thereby increasing the revenue. On the other hand, when a physical link fails, the F-SVNE algorithm prioritizes the remapping of virtual links with high penalties based on link resource balance, reducing the penalties caused by failure recovery and improving the long-term average revenue–cost ratio.
Figure 5. Long-term average revenue-cost ratio.
Table 8. Long-term average revenue-cost ratio.

6. Discussion

This paper proposes a new survivability mapping strategy for link faults in virtual wireless sensor networks, which can quickly select routing paths, shorten fault recovery delays, and improve physical resource utilization. However, since the current research only involves single-domain virtual network mapping, when multi-domain virtual network mapping is involved, link failure problems within and between domains will arise. Therefore, exploring the survivability virtual network mapping algorithm for multi-domain link faults will be the next research direction.

7. Conclusions

The paper addresses the issue of survivable virtual network mapping in a multi-link fault scenario and proposes a novel algorithm. The proposed algorithm incorporates a multi-path selection approach to create a backup routing set for physical links, with a preference for selecting paths with a high link resource balance for link remapping. This approach aims to reduce physical resource fragmentation and enhance the utilization of physical resources. The experiments presented in the paper show that the proposed algorithm provides improvements in terms of the long-term average revenue-cost ratio, average failure recovery rate, and failure recovery delay. The results suggest that the F-SVNE algorithm is valid in enhancing the survivability of virtual networks in the presence of multi-link faults. However, the current research is limited to single-domain virtual network mapping, and does not consider link failures in the intra-domain and inter-domain scenarios that may occur in multi-domain virtual network mapping.

Author Contributions

Conceptualization, S.L. and P.Z.; methodology, S.L.; validation, S.L., Y.Y. and L.W.; formal analysis, W.P.; investigation, Y.Y.; resources, Y.J.; data curation, Y.J.; writing—original draft preparation, P.Z.; writing—review and editing, L.W.; visualization, P.Z.; supervision, W.P.; project administration, W.P.; funding acquisition, Y.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Key Research and Development Project of State Grid Chongqing Electric Power Company of funder grant number (2022 Chongqing Electric Science and Technology 2#) and National Natural Science Foundation of China (Grant 61901071).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
VSNVirtual Sensor Network
VNEVirtual Network Embedding
SLAService Level Agreement
WSNWireless Sensor Network
WSNInPWireless Sensor Network Infrastructure Provider
VSNSPVirtual Sensor Network Service Provider
VSNRVirtual Sensor Network Request
SVNESurvivable Virtual Network Embedding

References

  1. Liang, W.; Ma, C.; Zheng, M.; Luo, L. Relay node placement in wireless sensor networks: From theory to practice. IEEE Trans. Mob. Comput. 2021, 20, 1602–1613. [Google Scholar] [CrossRef]
  2. Bera, S.; Misra; Vasilakos, A.V. Software-defined networking for internet of things: A survey. IEEE Internet Things J. 2017, 4, 1994–2008. [Google Scholar] [CrossRef]
  3. Zhang, P.; Yao, H.; Liu, Y. Virtual network embedding based on computing, network, and storage resource constraints. IEEE Internet Things J. 2018, 5, 3298–3304. [Google Scholar] [CrossRef]
  4. Ezdiani, S.; Acharyya, I.S.; Sivakumar, S.; Al-Anbuky, A. Wireless sensor network softwarization: Towards WSN adaptive QoS. IEEE Internet Things J. 2017, 4, 1517–1527. [Google Scholar] [CrossRef]
  5. Lu, M.; Gu, Y.; Xie, D. A Dynamic and collaborative multi-layer virtual network embedding algorithm in SDN based on reinforcement learning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2305–2317. [Google Scholar] [CrossRef]
  6. Pentelas, A.; Papathanail, G.; Fotoglou, I.; Papadimitriou, P. Network service embedding across multiple resource dimensions. IEEE Trans. Netw. Serv. Manag. 2021, 18, 209–223. [Google Scholar] [CrossRef]
  7. Chowdhury, M.; Rahman, M.R.; Boutaba, R. ViNEYard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Trans. Netw. 2012, 20, 206–219. [Google Scholar] [CrossRef]
  8. Rahman, M.R.; Boutaba, R. SVNE: Survivable virtual network embedding algorithms for network virtualization. IEEE Trans. Netw. Serv. Manag. 2013, 10, 105–118. [Google Scholar] [CrossRef]
  9. Yu, H.; Anand, V.; Qiao, C.; Sun, G. Cost efficient design of survivable virtual infrastructure to recover from facility node failures. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–6. [Google Scholar]
  10. Chowdhury, S.R.; Ahmed, R.; Khan, M.M.A.; Shahriar, N.; Boutaba, R.; Mitra, J.; Zeng, F. Dedicated protection for survivable virtual network embedding. IEEE Trans. Netw. Serv. Manag. 2016, 13, 913–926. [Google Scholar] [CrossRef]
  11. Pourvali, M.; Bai, H.; Crichigno, J.; Ghani, N. Multicast virtual network services embedding for improved disaster recovery support. IEEE Commun. Lett. 2018, 22, 1362–1365. [Google Scholar] [CrossRef]
  12. Shahriar, N.; Ahmed, R.; Chowdhury, S.R.; Khan, A.; Boutaba, R.; Mitra, M. Generalized recovery from node failure in virtual network embedding. IEEE Trans. Netw. Serv. Manag. 2017, 4, 261–274. [Google Scholar] [CrossRef]
  13. Shahriar, N.; Chowdhury, S.R.; Ahmed, R.; Khan, A.; Fathi, S.; Boutaba, R.; Mitra, J.; Liu, L. Virtual network survivability through joint spare capacity allocation and embedding. IEEE J. Sel. Areas Commun. 2018, 36, 502–518. [Google Scholar] [CrossRef]
  14. Yang, Z.; Yeung, K.L. SDN candidate selection in hybrid IP/SDN networks for single link failure protection. IEEE/ACM Trans. Netw. 2020, 28, 312–321. [Google Scholar] [CrossRef]
  15. Fische, A.; Botero, J.F.; Beck, M.T.; Meer, H.; Hesselbach, X. Virtual network embedding: A survey. IEEE Commun. Surv. Tutor. 2013, 15, 1888–1906. [Google Scholar] [CrossRef]
  16. Kaiwartya, O.; Bai, H.; Crichigno, J.; Ghani, N. Virtualization in wireless sensor networks: Fault tolerant embedding for Internet of Things. IEEE Internet Things J. 2018, 5, 571–580. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.