Survivability Mapping Strategy for Virtual Wireless Sensor Networks for Link Failures in the Internet of Things

: In the case of virtual wireless sensor networks, a link-failure-oriented survivable virtual sensor network mapping algorithm (F-SVNE) is proposed to address the issue of link failure in the underlying wireless sensor network. First, the algorithm utilizes the fast routing strategy and creates a backup route set based on a multi-path selection algorithm to reduce the delay in fault recovery caused by path selection. Second, the survivable virtual sensor network mapping algorithm is adopted based on the routing set. Finally, in the mapping stage, the efﬁciency and reliability of the algorithm are comprehensively considered, and the path with the largest survival probability is selected from the backup route set of the faulty link to remap the virtual link affected by the link failure. Empirical results demonstrate that the F-SVNE algorithm can efﬁcaciously lessen the failure recovery delay, and improve the long-term average revenue–cost ratio and average failure recovery rate.


Introduction
With the desires of users of Internet of Things (IoT) applications continuing to grow, different application scenarios and business requirements have shown disparate performance indicators for IoT. The Wireless Sensor Network (WSN), which serves as the underlying sensing device of IoT, is typically deployed randomly in unattended areas and harsh environments to perform various complex tasks. Moreover, WSN plays an important role in smart cities, medical monitoring, intrusion detection, and emergency response fields [1]. However, the deployment of WSN is oriented around a specific domain and single user, resulting in the flexibility and scalability of task execution being greatly limited, which leads to the resource utilization of sensor nodes being less than 20%; they are therefore unable to meet the different Quality of Service (QoS) requirements of diverse applications. Traditional software embedding schemes that add new application components to the existing network architecture can cause the existing network architecture to become cumbersome and rigid. However, network virtualization technology [2][3][4] can effectively solve the above problem, and has the significant economic benefits (such as reduced investment and operating costs) of leasing resources (sensing services) to interested third parties. Network virtualization technology also provides the ability to rapidly configure and recover physical network resources from failure, as well as scale on demand. To enhance the potential of IoT, Virtual Sensor Network (VSN) technology for multi-task resource sharing was conceived of, in order to improve the effective use of sensing resources through the multi-user sharing of large heterogeneous sensing infrastructure resources.
Currently, virtualized WSN can be decoupled into two parts: the Wireless Sensor Network Infrastructure Provider (WSNInP) and the Virtual Sensor Network Service Provider • A fast routing policy is established and a multi-path selection algorithm is used for physical link faults to establish a backup routing set for each physical link to reduce the fault recovery delay. • A failure probability model is established to calculate the survival probability of the underlying links. Taking into account virtual network mapping cost and survival probability, the path with the maximum survival probability is selected from the backup routing set of faulty links to remap the virtual links affected by link failures.
The main body of this paper is divided into seven sections. The first section is the introduction, which describes the research background and contributions of virtualized WSN. The second section is the related work, which describes the current research status and existing problems of WSN. The third section deals with problem modeling for virtualized WSNs. The fourth section is the virtual network multi-link fault recovery strategy, including the construction of backup routes, the link survivability probability model and link remapping. The fifth section provides the simulation analysis, firstly by describing the parameter settings, and then showing the simulation results and result analysis. The sixth and seventh sections are the discussion and conclusion sections, respectively, summarizing the contributions and future developments of this research.

Related Work
With the rapid adoption of IoT applications, there is an increasing desire for the valid utilization of underlying physical network resources. Virtualization technology enables resource sharing among different users in the underlying physical network. The existing literature mainly focuses on Virtual Network Embedding (VNE) for fault-free virtual networks, with the goal of increasing the acceptance rate of virtual network requests [7] or minimizing embedding costs [3], and designing heuristic algorithms to approximate optimal solutions to enhance virtual network revenue. Table 1 lists the advantages and disadvantages of existing survivable virtual network mapping methods and the research method applied in this paper. Most of the current research on survivability focuses on mechanisms that ensure Survivable Virtual Network Embedding (SVNE) by reserving physical links for virtual links, and triggering datum repair when failures occur in the underlying physical network due to node or link failures. The multi-path selection link resource method in this paper not only reduces the possibility of the fragmentation of physical resources, but also improves the utilization of physical resources.
Rahman et al. [8] formulated a mixed integer linear programming method for survivable virtual network mapping in situations where a single link fails. In the following research work, different survivable virtual network mapping methods are derived from two aspects of physical node and link failure. Survivable virtual network mapping methods for the failures of physical nodes can be broadly categorized into two types, among them, the references [9,10] offer dedicated or shared underlying physical network backup resources under the circumstance of a single physical node or multiple physical node failures to improve the survivability of the virtual network; however, although this method improves the fault response rates, the excessive redundant backup wastes a lot of physical resources. In references [11,12], the passive restoration method is put forward to improve the survivability of the mapping algorithm, i.e., node backup resources are not reserved in advance to manage underlying physical networks experiencing one or more physical node failures after using the rest of the physical resources affected by virtual node mapping. Although this method avoids redundancy backup resource waste, it increases the recovery time delay and does not guarantee a good failure recovery rate. Another direction of research in survivable virtual network embedding is to ensure the survivability of virtual networks during the occurrence of one or multiple physical link failures. A study in the literature [13] proposed using a heuristic algorithm that jointly optimizes the allocation of backup data provided by physical network and virtual network embedding, allowing for valid link repair during the occurrence of multiple physical link failures. Reference [10] considers the reliability of mapping theorized as a constraint and guarantees the survivability of theoretical networks through dedicated datum backup. To confirm the degree of importance of protection when multiple theoretical networks fail simultaneously, Ref. [12] proposed a fair recovery model and priority-based recovery model to address failures in the underlying reliability. However, these survivable theoretical network embedding algorithms often adopt redundant protection mechanisms that require additional resource overhead, resulting in a significant amount of resources being occupied and reducing the utilization rate of underlying resources. In [14], the use of multi-path repair and link remapping methods for link failure recovery is studied in the case of a single physical link failure to ensure the survivability of theoretical networks; however, this method is proposed for single link failures and does not consider the complexity of multiple link failures.
At present, in the WSN environment, the redundancy protection mechanism is usually adopted to improve the viability of virtual network mapping and provide backup mapping resources for virtual networks. However, this requires extra resource overhead and causes a large number of resources to be occupied. Furthermore, survivable virtual network mapping studies mainly focus on node failure and single link failure. For the above problems, a link-failure-oriented survivable virtual sensor network mapping algorithm is proposed in order to ensure the viability of virtual sensor network mapping for multi-link faults in virtual WSN scenarios. The algorithm adopts the expressway strategy, establishes physical link backup routing sets which reduces the fault recovery time delay caused by the path selection, and routes sets according to the virtual sensor network survivability mapping algorithm. The fault link backup routing option for the survival probability of the largest path is affected by the link failures and heavy mapping of virtual links is conducted one by one. Thus, the virtual network survivability is guaranteed to be effective, the probability of physical resource fragmentation is decreased, and the utilization rate of physical resources is increased.

Network Model
The architecture of virtualized wireless sensor networks is demonstrated in Figure 1: the infrastructure layer, the network services layer, and the application layer are part of the network. The infrastructure layer consists of a dense distribution of various types of sensor nodes that provide perceptual data and forward data services for theoreticality. The network services layer abstracts the physical resources and forms corresponding VSNs based on different user-requested tasks. Finally, each VSN is migrated and isolated to effectively coordinate multiple applications for sensing tasks. The application layer is responsible for receiving user-requested tasks and attaching the necessary QoS requirements. Table 2 lists all key symbols and their meanings for easy understanding.
The underlying physical network is expressed by an undirected graph G S = (N S , L S ), where N S = n s 1 , n s 2 , . . . , n s m is the sensor node set, c n s i represents the CPU computing capability of the sensor node, loc n s i denotes the geographical location of the sensor node, and L S = l ij n s i , n s j ∈ N S indicates a physical link set, l ij indicates the physical link between the corresponding sensor node pair n s i , n s j on the physical network. The transmissibility of the homologous communication link between node pairs n s i , n s j is b l s ij , the path set between the source nodes n s i and the sink node is P S n s i , in the physical network.
VSN is still expressed using an undirected graph G V = (N V , L V ), where N V and L V virtual nodes and link sets. Since different VSN requests correspond to different services, the degree of demand for resources is also different. For any virtual node, indicates the computational capability of the virtual node request of n v i . loc n v i indicates the sensing position of the virtual node n v i . According to the location requested by each user, physical sensor nodes are selected within the one-hop communication range to perform sensing tasks. For any virtual link l v ∈ L V , the demanded transmission rate is b l v ij , and the physical path is a route from the source to the sink node after the link is mapped.

S
Underlying physical network V Virtual sensor network G Undirected graph N Collection of sensor nodes L Link set c(n i ) Sensor node computing capabilities loc(n i ) Geographic location of sensor nodes l ij Link between nodes n i , n j b(l ij ) Communication link transfer rate between nodes n i , n j P n s i Collection of paths from the source node to the Sink node

Objective Function
For VSNR, the computing and storage resources required by virtual sensor nodes are fixed and do not vary with different physical sensing nodes, while the resource consumption of virtual links varies greatly with different physical mapping paths. Therefore, when mapping virtual sensor networks, minimizing link resource consumption should be considered. The objective function is calculated as follows: The constraint is as follows: where r n v i ,n s i and f ij→ab are used as decision variables for node and link mapping, respectively, if the virtual space node n v i is successfully mapped to the physical space as n s j , and s l s jb indicate the communication resources consumed by the working link and the recovery link, respectively. Equation (2) is a node independence constraint, indicating that the same physical space node cannot be mapped to virtual space nodes from the same VSN. Equation (3) represents the computational capability constraint requested by the virtual space node. When the virtual space node performs node mapping, the residual computational datums of the chosen candidate mapping the reliability of space nodes should exceed the processing power of by the virtual node. Similarly, Equation (4) shows the link communication datum constraint of the virtual network. Equation (5) is the geographical location constraint demanded by the virtual node, that is, the geographical location demanded by the virtual node must be within the one-hop communication range of the mapped physical node.

Evaluation Index
In this paper, we employ five metrics of the VNE algorithm principally to evaluate the effectiveness of the algorithm, including long-term average revenue, long-term resource consumption cost, revenue cost ratio, virtual network request acceptance rate, and failure recovery success rate [15]. These metrics collectively provide a comprehensive assessment of the algorithm's performance in terms of revenue generation, resource utilization, costeffectiveness, and network reliability. The long-term average revenue-cost ratio means that the revenue of a virtual network request at time t is defined as its required resources, and the cost of accepting this virtual network request at time t is defined as its total physical resource consumption. The long-term resource consumption cost, and the revenue of WSNInP depends on the service time t requested by the VSN and the underlying WSN resources required; thus, the long-term revenue-cost ratio of WSNInP is the ratio of its long-term revenue to long-term cost within a given period, t. In order to improve the long-term benefits of WSNInP, it is necessary to consider the trade-off between the benefits of VSNR being successfully mapped and the penalty to be paid due to the failure of VSNR as a result of the failure of the underlying WSN. The virtual network request acceptance rate is an effective performance index that is used to measure the mapping efficiency of the algorithm. The larger the value, the higher the utilization rate of the underlying WSN resources, and the higher the benefits for WSNInP. The failure recovery success rate is the ratio of the number of VSN requests successfully recovered within a period to the total number of VSN requests that fail due to the failure of the underlying WSN. In addition, this paper uses the virtual network request acceptance rate and failure recovery success rate to evaluate the virtual sensor network.
The revenue of WSNInP is measured in terms of CPU resources expended by the virtual sensor network of IoT and communication link transfer rate resources, which are calculated as follows: The long-term average return of WSNInP can be acquired from Equation (7), which is calculated as follows: represents the revenue from successfully mapping VSNR in the period T . The resource consumption cost of WSNInP is the sum of CPU resources and communication link transmission rate resources, which is calculated as: where hop n v i , n s i indicates the quantity of hops from the physical sensor node n s i to the sink node after a virtual node n v i is mapped to the physical sensor node n s i . Equations (9) and (10) can calculate the long-term average revenue-cost ratio, which can be calculated as: During the VNE, if a physical link fails and the link fails to recover, the WSNInP shall bear the penalty S G V specified in the SLA, which is computed as: where ω is the penalty factor. Therefore, the long-term average revenue-cost ratio is newly computed as: where FB represents the physical links that fail and are not repaired within the period T . Assume that the quantity of all VSNRS is G V num and the quantity of VSNRS accepted after mapping is G V acc . Therefore, the acceptance rate of VSNR is computed as: The success rate of fault recovery is stipulated as the ratio of the quantity of VSNR requests that are successfully repaired from the initial time to time t to the sum total of VSNR asks that are invalid due to physical network faults. The ratio is calculated as:

Backup Route Collection Build
In the virtual wireless sensor network environment, the virtual to physical mapping issue can be settled by performing node mapping and link mapping. Firstly, in the node mapping phase, the most suitable physical sensor node is selected for the virtual node as the source node for mapping to discover the physical path between the source and the sink node. Node mapping helps to select suitable physical sensor nodes in the WSN perception tasks; thus, it should consider whether the current physical sensor nodes meet the request of virtual node resources while also taking into account the current node mapping after follow-up in terms of the influence of the virtual network, so that every node mapping instance can be used to consider the various aspects of performance, meet the overall delay, reduce resources and adhere to other requirements. To evaluate the suitability of candidate mapping physical sensor nodes, the distance among the mapped physical sensor nodes with the sink nodes should be taken into account.
Resources are limited because the physical sensor nodes in WSNs can undergo physical sensor node death due to rapidly depleted resources when multiple VSNs share the same physical sensor nodes, leading to virtual network service failure and to multiple virtual nodes competing for the same physical link resources, meaning the survivability of virtual networks cannot be guaranteed. Therefore, to prolong the lifetime of WSN and ensure load balance, selecting active nodes with a greater number of remaining resources can help to effectively alleviate this situation. Thus, the activity degree E n s i of each physical sensor node is: where u represent the number of virtual nodes on the physical node, n s i , n s j is the physical node mapped successfully, and hop n s j , Sin k denotes the amount of hops among the source nodes with the sink node.
After the virtual node is successfully mapped to the physical node, a physical communication route to the sink node will be found for the physical sensing node. To improve the survivability of the virtual sensor network, the backup strategy of passive recovery is adopted for the underlying physical links. Compared with active mapping, which allocates an end-to-end backup route for every last virtual request link, passive mapping performs link remapping only when a link fails.
Due to the complexity of the path selection algorithm, the remapping of faulty links leads to a considerable delay, generating damage in user data. To enhance the service experience of users, and on the basis of the shortest path algorithm, a multi-path selection algorithm is proposed in this paper. Before the virtual sensor network request arrives, the multi-path selection algorithm is used to calculate the backup paths for every last underlying link, construct a backup routing set and shorten the link remapping delay. The multi-path selection algorithm considers multiple resource constraints in the specified path hops and the link mapping process contrasts the shortest path algorithm. By searching each physical link, it finds multiple paths that meet the constraints and forms a backup route set.
When the underlying physical link fails, a backup path must be provided for the virtual link to ensure service continuity. The backup path has the same source node as the faulty link. Due to the connectivity of the network, a virtual link has multiple backup routes to option from. On the underlying physical network, each additional hop consumes a greater bandwidth and introduces greater delay. Therefore, hop counts are used as an indicator to measure the merits of a backup path, and the paths that meet the hop count standard are included in the backup route set as follows: We define a function E G S , l ij , h = m hop(x) = h , h ≥ 2 , then, this function represents the path set m x that has the same source node as a physical link l ij , does not intersect with the link l ij , and hops from the source node to the sink node through h . Therefore, the backup route set meeting the conditions can be defined as E G S , l ij , h . This function represents the set of all paths that have the same source node as a link l ij , are disjointed with the link l ij , and can reach the sink node from the source node within a specified h hop.

Link Survivability Probability Model
When the underlying physical link fails, whether the virtual link can be successfully remapped depends on the resource status of the backup route set of the underlying physical link. If the paths of the backup route set have enough available resources and are in good working status, the probability of successful remapping is high when a link fails. If the backup route set does not have enough resources to reroute traffic for the underlying link, the probability of successful rerouting of the underlying link is low. Therefore, during link mapping, mapping critical links to the underlying links of the backup routing set with a good resource status will improve the recovery rate of link faults.
Define the probability of survival of a physical link P(l ij ) and indicate the probability of recovery by remapping when a link fails. During link mapping, the link survival probability P(l ij ) is calculated to select the physical communication path with a higher survival probability and to boost the link survivability of virtual sensor network mapping. The size of P(l ij ) depends on the relationship between the remaining communication link resources Q l ij in the backup route set of a physical link l ij and the used communication link resource U l ij . If U l ij is much larger than Q l ij , when the physical link l ij fails, its backup routing set can meet the re-routing requirements of the physical link l ij , that is, the survival probability of the physical link P(l ij ) is high. U l ij and Q l ij are calculated as follows: where l v ij → l ij represent the virtual link, and l v ij is mapped to the physical link l ij . b p l v ij and b b l v ij denote the physical link l ij which carries the active bandwidth required by the virtual link and the standby bandwidth used for link remapping, respectively; U l ij is the sum of those. Q(x) indicates the minimum bottleneck bandwidth of each path in the path set that can be used for link remapping. When the underlying physical link l ij fails and the available communication link resource Q(x) of a standby path of the physical link l ij is much greater than the used communication link resource U l ij of the physical link l ij , the fault recovery rate of the physical link l ij is 1. Otherwise, the fault recovery rate of the physical link l ij is 0. Therefore, the normalized link survival probability S(x) is defined as: According to the backup route set constructed, before virtual sensor network mapping, the backup link set F G S , l ij , h with a hop limit of h hops is calculated for the physical link l ij . Each backup path l ij in x provides the remapping service for physical links. Therefore, the survival probability P(l ij ) of the underlying physical link l ij is calculated as follows: If the backup link set of the physical link l ij is empty, the link survival probability is 0 because no backup link can offer rerouting for the physical link l ij . When the network request for the virtual sensor is achieved, the value of the update P(l ij ) will be calculated first to provide a more accurate probability value for the virtual network mapping.

Link Remapping
The pseudo-code of the link failure-oriented survivable virtual sensor network mapping algorithm is shown in Algorithm 1. When the virtual sensor network reach, select the physical node to be mapped based on node activity E n s i , and then map the virtual node to the physical node. Then link mapping is performed and the backup routing set pathlist(l ij ) of physical link l ij is calculated based on the multi-path selection algorithm. If the physical link is not faulty, the link with the highest survival probability is selected for mapping based on the link survival probability model. If the physical link fails, the statistics are influenced by the physical link l ij set of virtual links, and the virtual link request link resources in descending order will result in the collection and calculation of the balance link resources, virtual link, in turn, heavy mapping in the link from the collective resources to balance the route of the largest.
When the underlying link fails, the link remapping algorithm is used to reroute the traffic from the faulty to the backup link set. Because one underlying link may carry multiple virtual requests, the failure of one underlying link will cause multiple virtual requests to be unavailable. The remapping algorithm is used to migrate the traffic of the virtual requests affected by the fault. However, if the backup route of the physical link cannot restore all the virtual links, some virtual requests still cannot run normally, which will result in a penalty. To minimize the loss of the underlying facility provider, the virtual links that generate more penalties should be remapped preferentially during link remapping. Based on this, the link resource balance degree is defined as: where min is any path in the backup routing set of faulty link l ij . The link resource degree of equilibrium is applied to equilibrium for the link resource consumption of physical links and lessens the feasibility of resource debris. The larger the link resource balance is, the less likely the resource fragmentation is to occur, thus improving the utilization of physical resources.

Algorithm 1 Survivable virtual sensor network mapping algorithm for link failure
Input: G S , G V ; Output: Mapping results 1: for each virtual network request do 2: for virtual network requests virtual nodes do 3: Select a mapping node based on node activity E n s i 4: end for 5: Calculate a backup routing set pathlist(l ij ) of physical link l ij based on the multipathing selection algorithm 6: if the physical link is not faulty during virtual link mapping then 7: According to the link survival probability model, the link with the highest survival probability is selected for mapping 8: end if 9: if the physical link l ij is faulty then 10: The system collects statistics on the set of virtual links impacted by physical link l ij and sorts the link resources requested by the virtual links in descending order. The result is saved to set VL 11: for the physical link l ij is faulty do 12: Backup routing set pathlist(l ij ) based on the physical link l ij 13: for pathlist(l ij ) set of all paths do 14: The link resource balance degree is calculated, and the virtual links in VL set are successively remapped to the path with the largest link resource balance degree 15: end for 16: end for 17: end if 18: end for 19: return

Setting
In this chapter, Matlab R2018b is applied to verify the performance of the proposed algorithm. In the simulation experiment, VSNR arriving offline is considered in this paper. So as to realistically simulate the physical network, WSN is composed of 50 evenly distributed sensor nodes, the transmission radius of every last sensor node is 30 m, and the CPU resources of every last sensor node are evenly distributed [100,200]. The link capacity between sensor nodes is evenly distributed [80, 100]. The arrival of link faults obeys the Poisson distribution with a parameter of 0.05 and a candidate set hop count of 4.
VSNR arrives according to Poisson distribution, and its effective reach is 8 arrivals per 100-time units. The service time of each VSNR obeys an exponential distribution, with an expectation of 100-time units. The magnitude of each virtual node is subject to the uniform allocation [3,5], the CPU resources requested by the virtual node are subject to the uniform allocation [10,20], and the link resources requested are subject to the uniform allocation [10,25]. All cost and benefit parameters in VSNR are set to 1. Each simulation lasted 50,000-time units, and the simulation was executed 10 times in total. The average evaluation index was taken as the eventual experimental result to eliminate the influence of random factors. The specific simulation settings are shown in Table 3.
This paper extends the classical two-stage mapping algorithm [3] to the C-SVNE algorithm, applied to the link failure environment as the benchmark comparison algorithm, due to the imperfect research on link failure survivability in virtualization WSN. The algorithm experiment settings in [3,16] include four layers, namely the physical layer, access layer, sensor virtualization layer and application layer, but the algorithm in this paper has a three-layer structure, including the infrastructure layer, network service layer and application layer. In addition, based on reference [3], the link failure recovery algorithm N-SVNE in reference [16] is adopted as a further comparison algorithm for F-SVNE. The specific comparison is shown in Table 4.

Main Results
In Figure 2 and Table 5, the trend of the VSNR acceptance rate over time for three comparison algorithms is shown. It can be seen that the acceptance rate of VSNR in the comparison algorithms begins to drop from 1 over time and eventually tends to become stable in dynamic equilibrium. In the initial stage of virtual network mapping, the nodes and links in the underlying physical WSN have rich resources, so the initial three algorithms have a high acceptance rate. As the underlying physical network resources occupied by previous VSNR requests increase, physical WSN resources are reduced, resulting in some VSNRs being rejected due to insufficient resources. The VSNRF-SVNE algorithm proposed in this paper finally accepts a rate that is steady at around 0.73, which is higher than that of other algorithms. This is because, during the node mapping stage, the F-SVNE algorithm, using the measurement of activity index, leads the task of physical nodes bearing selection to be relatively balanced, and the contrast algorithm is preferred in current physical network resources of nodes and links. As a result, a large number of key nodes and links are rapidly occupied, and subsequent VSN mapping fails. In Figure 3 and Table 6, the average failure recovery rate for three comparison algorithms is shown. It can be seen that the average failure recovery rate of the comparison algorithms gradually decreases and tends to become stable with time. In the initial phase of virtual mapping the resources in the physical network are sufficient to recover faulty links. As the number of VSNRs increases, a large amount of underlying physical resources become occupied and the resources used for fault recovery decrease. As a result, the average fault recovery rate decreases. Among them, the F-SVNE average recovery rate is the highest. This is because the algorithm uses multiple path selection algorithms for backup routing collection, a collection of backup paths meets the resource constraints, and the priority use of link resources balances the large backup paths. Fragmentation occurs when reducing resources, the remaining backup resources are optimized at the same time, and the average recovery rate increases. The reason that C-SVNE has the lowest average failure recovery rate is that when a link failure occurs, it adopts the shortest path algorithm to recover the link failure. As the remaining available resources of the underlying physical network gradually decrease, it cannot discover the appropriate communication route for remapping the faulty link.  In Figure 4 and Table 7, the average failure recovery delay for three comparison algorithms is shown. It can be seen that the C-SVNE algorithm has the longest average failure recovery delay, while the N-SVNE and F-SVNE algorithms have shorter average failure recovery delays. The longer average failure recovery delay of the C-SVNE algorithm is due to the fact that it does not have any backup link sets. When a physical link fails, the algorithm needs to spend additional time choosing an appropriate link for remapping on account of the remaining physical resources. On the other hand, both the N-SVNE and F-SVNE algorithms create backup link sets for physical links, which saves time for link remapping. Among the two algorithms with backup link sets, the F-SVNE algorithm exhibits the shortest average failure recovery delay. This is because the F-SVNE algorithm selects backup paths with a large link resource balance for virtual link remapping, which further shortens the path selection time and reduces the average failure recovery delay. In summary, the F-SVNE algorithm achieves the shortest average failure recovery delay among the three algorithms, followed by the N-SVNE algorithm, while the C-SVNE algorithm has the longest average failure recovery delay on account of the absence of backup link sets. In Figure 5 and Table 8, the long-term average revenue-cost ratio for three comparison algorithms is shown. From the diagram, we can observe that the long-term average cost of the three algorithms gradually decreases over time and reaches a stable state. This is because as a large number of physical network resources are being used, some physical link failures cannot be restored due to insufficient resources, resulting in lower average income than cost for a prolonged period, and a dynamic balance in a steady state is eventually achieved. The long-term average revenue-cost ratio of the F-SVNE algorithm is consistently higher than that of the other two algorithms, and finally stabilizes at around 0.6. This is because, on one hand, the F-SVNE algorithm reduces the fragmentation of physical resources, optimizes the remaining backup resources, and improves the acceptance rate of VSNRs, thereby increasing the revenue. On the other hand, when a physical link fails, the F-SVNE algorithm prioritizes the remapping of virtual links with high penalties based on link resource balance, reducing the penalties caused by failure recovery and improving the long-term average revenue-cost ratio.

Discussion
This paper proposes a new survivability mapping strategy for link faults in virtual wireless sensor networks, which can quickly select routing paths, shorten fault recovery delays, and improve physical resource utilization. However, since the current research only involves single-domain virtual network mapping, when multi-domain virtual network mapping is involved, link failure problems within and between domains will arise. Therefore, exploring the survivability virtual network mapping algorithm for multi-domain link faults will be the next research direction.

Conclusions
The paper addresses the issue of survivable virtual network mapping in a multi-link fault scenario and proposes a novel algorithm. The proposed algorithm incorporates a multi-path selection approach to create a backup routing set for physical links, with a preference for selecting paths with a high link resource balance for link remapping. This approach aims to reduce physical resource fragmentation and enhance the utilization of physical resources. The experiments presented in the paper show that the proposed algorithm provides improvements in terms of the long-term average revenue-cost ratio, average failure recovery rate, and failure recovery delay. The results suggest that the F-SVNE algorithm is valid in enhancing the survivability of virtual networks in the presence of multi-link faults. However, the current research is limited to single-domain virtual network mapping, and does not consider link failures in the intra-domain and inter-domain scenarios that may occur in multi-domain virtual network mapping.

Conflicts of Interest:
The authors declare no conflict of interest.

Abbreviations
The following abbreviations are used in this manuscript: