Research Article

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Table 1

Simulated networks used in evaluation.

Network FT-6-A FT-6-B FT-8 Waxman

Forwarding node45458024
End node382790403
Service node162738173