Abstract

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial time by using the Benders decomposition technique and cutting plane approximation. To ensure the nonincreasing character of the Benders upper limit, a local branching method was also added to improve the convergence. Simulation results indicated that the proposed method is superior to the existing method and has better overall performance.

1. Introduction

The Industrial Internet of Things (IIoT) is regarded as an important driver of the intelligent transformation of the global industrial system. Relying on hundreds of millions of seamlessly deployed sensors, collectors, and controllers, the Industrial Internet of Things can simulate, predict, and control the full cycle of the manufacturing process [1]. As the “brain” of the IIoT, the edge computing network provides more sufficient computing processing capabilities for wireless acquisition devices, effectively reducing processing and transmission delays, and is useful for digital twin (DT) [2], virtual reality (VR), etc. Enterprise high-level applications have laid a solid foundation [3]. At the same time, the wired link connection between edge computing nodes also makes the migration of computing tasks between nodes smoother, effectively alleviating the problem of unbalanced space-time allocation of computing resources caused by the space-time fluctuations of computing demands of the IIoT.

The normal and stable operation of the edge computing network is the key to the efficient operation of the IIoT. Once the “brain” is damaged, the IIoT system will lose effective control over the “limbs” (such as supply chain monitoring, data visualization, and analysis), bringing countless economic losses, even life-threatening. However, the stability requirements of edge computing networks face internal and external challenges. On the one hand, the edge computing network is coupled with the power grid, control network, and other subnetworks in the IIoT, forming a highly vulnerable interdependent network [4]. Any slight fluctuations in other subnets may be transmitted to the edge computing network, causing large-scale system cascading failures. On the other hand, unpredictable events such as natural disasters and man-made attacks also test the robustness of edge computing networks at any time [5]. In order to meet the above challenges, on the one hand, the reliability of the edge computing network can be strengthened so that it can adaptively cope with various network fluctuations and prevent network failures. On the other hand, and more importantly, it is necessary to explore the rapid repair mechanism after the network is damaged, so that the network performance can be restored to the level close to before the damage as soon as possible.

Although the design of the repair mechanism is crucial for the sustainable and stable operation of the network, there is currently no research literature specifically targeting edge computing network scenarios in the IIoT. In view of the similarity of network topology, network dynamics, and other characteristics, some existing network repair strategies can still provide some reference for the design of edge computing network repair mechanisms in the IIoT. The research on the existing network repair mechanism mainly focuses on the rapid repair after the local network is damaged. Reference [6] constructs the problem of single node or link damage in the network as an integer linear programming problem and proposes a data migration-aware repair model, which achieves an effective balance between service interruption rate and repair cost. Further, in the literature [7, 8], considering the problem of network connectivity damage in multinode failure scenarios, it is proposed that users can be used as transit nodes between disconnected edge nodes in a device-to-device (D2D) way [7] or mobile devices can be used. The access node realizes that the data between network nodes can be reached everywhere [8], ensuring the connectivity of the damaged network. Different from the above studies, the reference [9] considers the continuous damage state in the case of network attack, transforms the network dynamic repair problem into a differential game theory problem, and enhances the network repair ability through Nash equilibrium necessary conditions and competitive strategy sets. However, the above-mentioned research on local network repair often ignores global network nodes, dynamic characteristics between links (such as flow migration), and practical scene constraints (such as link space layout without changes); it is difficult to effectively extend to the large-scale network damage scenarios that are more likely to occur in the IIoT.

After the network is damaged on a large scale, the initial available repair resources (such as the number of repair personnel and the number of replaceable devices) are often limited. How to effectively balance the limited system repair resources at the initial stage of repair and the urgent need for system performance recovery is an urgent problem to be solved in the current IIoT. Current research mainly focuses on the analysis of network topology. Reference [10] believes that large-degree nodes, that is, nodes with large node degrees, play a more important role in network connectivity and need to be repaired first. Similarly, in [11], considering that the link is damaged, the link with large betweenness centrality (BC) should be repaired first. Reference [12] found through the analysis of actual network data that weakly connected nodes in the network, that is, nodes with low degrees of themselves but connected to several large-degree nodes, play the most critical role in network connectivity, and their repairs are prioritized. The level should be higher than the large-degree node. However, the above schemes based on the growing maximum connected subgraph of network connectivity are all static network architecture analysis, ignoring the dynamic characteristics of the network. The large-scale network repair in the real environment often forms independent subgraphs first and then connects multiple subgraphs to form a maximum connected graph [13]. Therefore, in the engineering analysis, it is necessary to integrate more network equipment details and actual transmission dynamic analysis [14]. In order to solve the above problems, a heuristic algorithm that is easier to solve is proposed in [15]. However, it lacks the macroscopic analysis of the network, and the performance variance of the algorithm is large, so it cannot provide reliable performance guarantee. Similarly, both the simulated annealing algorithm [16] and the genetic algorithm [17] face the same dilemma as general heuristic algorithms and are easily trapped in local optimal solutions. Although the hill-climbing algorithm [18] or the gradient descent algorithm [19] can easily jump out of the local optimum and greatly reduce the computational complexity of the problem, the optimality of the solution cannot be guaranteed. This type of problem is also known as a network design problem (NDP). Due to the addition of the dynamic characteristics of the network, the complexity of the network design problem is extremely high (at least the NP-complete problem), and the traditional dynamic programming algorithm will cause the “dimension disaster” [20]. In reference [21], the problem of multihop computing task offloading in the hybrid edge cloud computing environment is studied, and the offloading method that meets the quality of service requirements is realized through the game method. In reference [22], optimization is carried out in terms of time cost and energy consumption cost to achieve the optimal allocation of large-scale green energy-saving computing resources. In reference [23], in order to meet the real-time requirements, an intelligent resource planning strategy under the hybrid computing structure is proposed. In summary, edge computing can provide more sufficient computing resources for field devices and reduce network load by deploying at the network edge closer to field devices, thereby meeting the requirements of task service quality and reducing system overhead in different scenarios.

In view of the practical dilemma faced by the current research, this paper proposes a repair mechanism for damaged edge computing networks in the IIoT scenario. Different from the existing literature, this paper deeply excavates the structural characteristics (topological relationship, link capacity) and dynamic characteristics (node computing requirements), and the link priority repair set decision and network computing migration issues are jointly considered, in order to achieve an efficient balance between the initial computing requirements and repair costs of network repair. The main contributions of this paper are summarized as follows.

A network repair mechanism is proposed in the case of large-scale damage to the edge computing network. Combined with the network structure and dynamic characteristics of edge computing, an analysis framework of priority repair set decision and resource scheduling in the early stage of network repair is provided.

Based on the Benders decomposition algorithm, the complex mixed-integer problem is decomposed into two parts, the main problem and the subproblem, which are easier to solve. For the subproblems of multivariable groups, by adding virtual source nodes and destination nodes, the problem is transformed into a network maximum flow problem to solve.

A Benders decomposition acceleration algorithm based on local branching method is designed. The trust region based on the Hamming distance is used to shrink the search range of the feasible region and accelerate the convergence speed of the algorithm.

Simulation results show that the proposed algorithm has better convergence performance and lower system overhead. Compared with the existing random repair, maximum connected graph repair, and betweenness centrality sorting repair and other topology-based repair algorithms, the proposed algorithm has better performance in multiple scenarios and has good scalability and adaptability.

2. System Model

For the edge computing network in the IIoT, consider an edge computing network with nodes, which is represented by the set . The edge nodes are connected by wired links; the link set is represented by . Since wired links are usually reliable, and only a small amount of channel coding complexity is required for computing tasks relative to edge nodes, the link between two edge nodes can be considered error-free [24]. The system parameters are shown in Table 1. It is worth noting that the edge computing network in the actual IIoT is often a hybrid link transmission network composed of wired links and wireless links. Since there is almost no damage to the wireless link, and its repair cost is negligible compared to the wired link, this paper only considers the case where all transmission links are wired links. Nevertheless, if the deep weakening of the short-term wireless channel is not considered, the wireless link in the static scenario (without considering the spectrum reallocation in the repair process) can be regarded as a nondestructive link with constant capacity, and the hybrid link transmission network can be considered equivalent to a pure wired link network, and the proposed algorithm will still be applicable.

The topology of the damaged edge computing network is shown in Figure 1. In the actual network, because edge nodes often have complex self-protection mechanisms (such as overheating protection), they are usually not prone to damage. Therefore, this paper does not consider node damage and focuses on link damage. In order to simulate the state of large-scale network failure caused by factors such as natural disasters, it is assumed that there are wired links in the network at the initial moment, where represents the percentage of damaged links in all links, and the set represents the damaged link. The set represents the link set that can still work normally. The damage of the link will cause the balanced computing migration flow between edge nodes to be broken and even form a computing island (computing migration cannot be performed, as shown in node 1 in Figure 1), resulting in a mismatch between computing requirements and computing capabilities, affecting the network computing performance. Constrained by limited repair resources at the initial stage of network repair (e.g., the number of repair personnel and replacement equipment inventory), it is impractical to repair all damaged links at the same time. In order to restore the network state as soon as possible, it can be distributed according to the network computing requirements, and some damaged links can be repaired preferentially, which is represented by the set (). For any link , due to the different degree of damage, the cost of maintenance, repair, and replacement is also different.

Considering that the local data computing requirement of the edge node is , the actual local computing amount is . It should be noted that is the total calculated arrival amount of the th edge node in the initial stage of network repair. For a given scenario, is a fixed value that does not change with time and can be estimated more accurately based on historical computing needs. For any edge node , the satisfies

Among them, is the maximum computing power of node .

Let the computational cost of migration between node and node be . If , the data computing task is migrated from node to . If , the data computing task is migrated from node to . Limited by the wired link capacity , the actual calculated migration of link satisfies

Further, for damaged links, the actual computational migration amount is not only determined by the wired link capacity, but also affected by the link repair decision, i.e. where

Among them, represents the priority to repair the link , that is, ; when means that the link is not repaired, it actually calculates the migration amount . In addition, for a single link , it can be known from the migration flow symmetry:

When the links in the set are repaired, it can be known from the law of the conservation of computation of nodes:

Among them, represents the local data computation requirement of node ; represents the amount of computing tasks that edge node has to give up due to data backlog due to limited computing power.

In order to repair as many links as possible, the amount of data discarded can be reduced, and the system performance can be improved, but it will cause a large system repair overhead. If there are too few repair links, the system repair overhead will be reduced, but it may cause the data to be discarded because it cannot be processed locally, which will damage the network performance. For quantitative analysis, the network performance in this paper is measured by the total cost of system data discarding. The greater the amount of data discarded, the higher the total cost of data discarding, and the worse the network performance. Therefore, in order to balance the repair cost and network performance at the initial stage of network repair (total cost of data discarding), the following system cost minimization problem can be constructed

Among them, represents the repair cost required to repair the link , denotes the cost of discarding each unit of data for node . The link repair decision vector , data discarding decision vector , the flow allocation vector , and the local actual computation vector . In problem , the total system overhead consists of two parts: the total cost of system repair overhead and data discarding. As mentioned above, the system repair cost and the total cost of data discarding are a pair of contradictory quantities, an increase in one value will lead to a decrease in the other value, and minimizing their sum can effectively balance their effects. When the link repair cost is large, it indicates that the importance of computing data is relatively low, and the system tends to temporarily repair less damaged links and discard data that cannot be processed. When the cost per unit of data discarding is large, the system tends to repair more damaged links to reduce the discarding of computing data.

Problem is a mixed-integer problem, NP-hard problem, and its data scale is large, and there is no known polynomial-time algorithm to solve the above problem. The current methods for solving the above problems can be divided into three categories: Heuristic algorithm [25], approximate algorithm [26], and exact algorithm [27]. The Heuristic algorithms are fast and easy to apply, but they lack rigorous theoretical proofs, and the results often deviate significantly from the optimal solution. Approximate algorithms, such as the slack variable method, have a limited solution scale, and the solution to the slack problem cannot accurately describe the optimal solution to the original problem. Different from the above two methods, the exact algorithm, such as the cut plane algorithm, can well explore the optimal solution of the problem through the iterative update of the cut plane and is widely used in the process of solving mixed-integer problems.

3. Algorithm Design

Benders decomposition algorithm [28] is a classical cutting plane algorithm, which is widely used to deal with real mixed-integer programming problems (such as locomotive scheduling and aviation route planning). This algorithm does not significantly increase the number of iterations with the increase of operating variables like the branch and bound method, nor does it produce dimensional disaster like dynamic programming, and does not appear heuristic, simulated annealing, and other algorithms have huge variance [29]. This section will give an efficient solution to problem based on the Benders decomposition algorithm.

3.1. Subproblem Description and Transformation

In the Benders decomposition algorithm, the original problem can be decomposed into two parts, the main problem and the subproblem, and the optimization variables in the main problem are called complex variables. When the complex variables are fixed, the remaining optimization problems (i.e., subproblems) in the original problem become relatively easy to solve. For the problem , if the value of the complex variable in the th iteration process is given, the subproblem can be expressed as

Since the 0-1 variable in the original problem is decomposed into the main problem, and the optimization variables in the above subproblems are all continuous variables, this problem can be equivalent to a minimum cost flow problem. This paper considers a typical environmental monitoring scenario in the IIoT. Each edge node in the edge network is responsible for processing the environmental data collected by wireless sensors. In the environment monitoring scenario, the computing tasks at each edge node have the same computing priority [3, 20], that is, the node discards the same cost per unit of data . Thus, the problem can be further transformed into the network maximum flow problem [30]. Figure 2 illustrates the above equivalence relationship with an edge network with four nodes.

In Figure 2, the connection line between nodes 2 and 3 is the damaged link that needs to be repaired determined in the iterative process, namely {, }. The source node and the destination node are newly added virtual nodes, the virtual link capacity of the source node and the four edge nodes is the maximum computing power of the four edge nodes, and the virtual link between the four edge nodes and the destination node represents the local data computation requirement of each edge node. The numerical values on each edge in Figure 2 represent the link capacity of the link, so that maximizing the total arrival flow to the destination node is equivalent to minimizing the total data discarded. The above transformed maximum flow problem can be efficiently solved by existing algorithms, such as the Ford-Fulkerson algorithm [31].

3.2. Cut Plane Generation and Main Problem Construction

In the Benders decomposition algorithm, the solutions of the subproblems are substituted into the main problem to generate linear constraints in the main problem, namely Benders cuts. Since this paper considers the perfect resource [32], that is, for any feasible solution to the main problem, there are always feasible subproblem solutions, and there is no need to generate feasible cuts; only the optimal cut needs to be constructed. In order to form the optimal cut plane of Benders, it is necessary to use the complementary relaxation principle of the dual problem [33]. According to the solution of the above subproblems, extract the dual variable , corresponding to the constraint in Eq. (3), which can be repaired system increment of link .

Theorem 1. The optimal cut plane of Benders in the th iteration can be expressed as

Among them, is the upper bound of the optimal solution of the objective function of the subproblem, and is the optimal value of the objective function obtained in the th iteration of the subproblem, that is, the minimum total cost of data discarding in the th iteration.

Proof. See Appendix A.1.

Substituting the above Benders optimal cutting plane into the constraints of solving the main problem, the main problem can be obtained as

Among them, represents the lower bound of the optimal value of the original problem , because the main problem only considers part of the constraints and is a relaxation problem of the original problem.

Different from the subproblem that determines the data migration, calculation, and discarding of the edge network, the main problem is responsible for determining the link set that needs to be repaired preferentially in the damaged link set . In the loop iteration process of the main and subproblems, the solution of the main problem is carried out given the amount of data migration, calculation, and discarding. The obtained by solving the main problem is in turn used for further solving of the subproblems, thereby gradually approximating the optimal data migration, calculation, discarding, and link repair strategies of the system.

3.3. Iterative Path Repair and Computational Migration Algorithm Based on Benders Decomposition Theory

The above main problem is initialized into subproblems, and the loop iteration starts to find the optimal solution. If the decision variables of the main problem cannot satisfy all the constraints in the iterative process, the algorithm is terminated, and the original problem has no solution. Otherwise, the iterative process continues until the optimal configuration of the network is found. The specific steps of the above process are shown in Algorithm 1.

Define:, given network parameters .
Initialization: Upper bound and algorithm lower bound , iteration accuracy parameter .
1: Cycle
2: Solve the main problem , if the main problem has no solution, terminate the algorithm, the original problem has no solution. Otherwise, and the algorithm lower bound
3: Solve the subproblem , get , , , and the minimum objective function value
4: Update algorithm upper bound
5:
6: Until the algorithm converges, the convergence condition is

When the algorithm converges, the system will repair the link whose value is 1 according to the calculated by the current iteration. After that, the solution of the subproblem is used to determine the amount of data flow migration between nodes, the actual computing power of each node is adjusted according to , and the data that exceeds the computing power is discarded. It should be noted that in the main problem, is a continuous variable and is a discrete variable, and the problem is still a mixed-integer problem. Although it can be solved by algorithms such as genetic ant colony algorithm, the complexity of the algorithm is still very high due to its large search domain space. In addition, in the process of each iteration, the introduction of a new cut plane in the main problem keeps the lower bound of the algorithm nondecreasing, but there is no similar mechanism to guarantee the monotonicity of the upper bound of the algorithm. This nonmonotonic constraint bound property will further aggravate the computational time overhead of the above algorithm.

4. Benders Decomposition Acceleration Algorithm Design

In order to solve the problems existing in the iterative path repair and computational migration algorithm based on Benders decomposition theory proposed in Algorithm 1, this paper further introduces the local branching technique in the iterative solution process [34]. Its main purpose is to find a better upper bound of the problem in each iteration process, in order to realize the inward clamping of the upper and lower bounds and reduce the computational complexity of the main problem.

4.1. Trust Region and Hamming Distance

As mentioned earlier, the Benders decomposition algorithm based on cut planes is not a stable algorithm, and in the early stages of the iteration, the solution of the problem fluctuates widely in different feasible regions, resulting in a slow convergence rate. In the edge computing scenario in the IIoT considered in this paper, a large number of optimization variables introduced by large-scale network damage, especially the introduction of the repair link decision vector with an initial search space of , will make this convergence speed problems are further exacerbated. The trust region is an excellent strategy to address the above-mentioned large-scale fluctuation characteristics. Considering that in the main problem is a set of 0-1 variables, the Hamming distance can be used to limit the distance between the two iterative solutions.

Assuming that is the feasible solution obtained by the th iteration of the original problem, the set of all 0-1 optimization variables with a value of 1 can be expressed as , and then the Hamming distance between the ()th iteration and the th iteration is

That is, the number of binary variables changes in the ()th iteration relative to the th iteration.

To speed up the convergence, the solution space can be decomposed into two independent trust regions:

Among them, represents the size of the trust region in the )th iteration, and the selection of its value depends on the complexity of the main problem and the volatility requirements of the search range. In the above way, the original problem is naturally divided into two subsolution spaces, and the local branching method is based on this. In the local branching method, Equations (14) and (15) are called the left and right branches, respectively.

4.2. Local Branching

Based on the Hamming distance, the solution space of the original problem can be divided into two closely connected neighborhood spaces according to the feasible solutions obtained by the th iteration of the Benders decomposition. Let be the solutions of all (including feasible solutions and nonfeasible solutions) calculated by the local branch method iteration during the th iteration of Benders decomposition, where the set of feasible solutions is denoted as (). According to the Hamming distance, the original problem can be branched into two independent left and right branch problems. The left branch problem is

Among them, Equation (17) indicates that the value that has been compared before is not repeatedly compared, Equation (18) indicates that the current left branch should be the branch of the right branch in the previous branch, and Equation (19) indicates the left branch restriction, and is the currently obtained optimal solution. Correspondingly, the right branch problem can be obtained as

Here, Equation (18) represents the right branch restriction.

Let be the optimal solution of the left branch problem , and the corresponding objective function value is , and then there is a local branching method algorithm flow as shown in Algorithm 2.

Define:, let the initial feasible solution of local branch iteration , and the corresponding objective function value is . Given , the maximum allowable computation time and the iteration accuracy parameter
1: Cycle
2: Divide the current branch into left branch and right branch , calculate and
3: If holds
4: Then update , and jump to the right branch
5: Otherwise, or has no solution
6: Let , add to the constraint Eq. (15), and update . Recalculate and of the left branch problem , go back to step 3)
7:
8: Until the algorithm computation time reaches or meets the accuracy requirement

The in the loop condition of Algorithm 2 is to avoid the situation that the branching problem cannot be solved because the Hamming distance is set too large during the calculation process. In a large-scale damaged network, the solution space of the repair link decision is very large, and choosing a smaller trust region size will be more conducive to improving the calculation speed of the left branch problem.

In the iterative process, the strict upper bound of the original problem can be obtained. At the same time, since the main difficulty of the original problem lies in the acquisition of the lower bound, a series of optimal cutting planes generated in each iteration process can also speed up the search speed, so that the Benders decomposition can simultaneously enhance the optimal solution of the problem in the iterative process. Search for upper and lower bounds [35].

4.3. Benders Decomposition Acceleration Algorithm Based on Local Branching Method

The Benders decomposition algorithm accelerated by the local branching method obtained by integrating the local branching algorithm into the Benders decomposition is shown in Algorithm 3.

Define:, given network parameters , .
Initialization: Upper bound and algorithm lower bound , iteration accuracy parameter
1: Cycle
2: Solve the main problem , if the problem has no solution, terminate the algorithm, and the original problem has no solution. Otherwise, and the algorithm lower bound
3: Solve the subproblem , and get , , , the dual variable and the minimum objective function value
4: Update upper bound
5: if
6: Determine the optimal solution, then terminate the algorithm
7: Otherwise, generate a new Benders optimal cutting plane
8: Run Algorithm 2 to obtain an enhanced upper bound , and a series of Benders optimal cuts generated by different feasible solutions
9:
10: Until the algorithm converges

Similar to Algorithm 1, when Algorithm 3 converges, the system will determine the set of repair links based on the et calculated by the current iteration. Then, according to the calculated values of , , and , the migration, calculation, and discarding of data in the network are determined. Different from Algorithm 1, the Algorithm 3 ensures the strict decrease of the upper bound of the original problem in the iterative process through the local branching technique. For large-scale damaged networks, this means that in each iteration process, the search space of the link repair decision vector to be optimized for the main problem is gradually reduced, and the search speed of the solution is gradually accelerated with the increase of the number of iterations.

In the new cuts obtained by each iteration of the above algorithm, not all cuts need to be added to the main problem solving process, and only the deepest cuts can be added (even the cuts with the smallest feasible region). Considering the convergence requirements of the algorithm and the poor performance of the initial stage of the Benders decomposition, it is possible to add trust region constraints only in the initial iteration stage. When the iterations become stable, this restriction is lifted.

It is worth noting that in each branch process, the branch problem has the same structure as the original problem . Therefore, for each branch problem, Algorithm 1 can be used to solve it. The cut plane obtained from the previous branching problem can also be used to solve the subsequent branching problem.

5. Simulation Results

In this section, the proposed iterative path repair and computational migration algorithm based on Benders decomposition theory (hereinafter referred to as Benders decomposition algorithm) and the iterative path repair and computational migration algorithm based on Benders decomposition acceleration theory based on local branching method (hereinafter referred to as Benders decomposition acceleration performance of the proposed algorithm) are simulated and tested. The performance advantages of the proposed algorithm compared with other benchmark algorithms are verified and analyzed.

5.1. Simulation Parameters and Comparison Algorithms

This paper considers an edge computing network with nodes, and the maximum computing power of each node in the initial stage of network repair is independent of each other and evenly distributed in (10, 25) Gbit. Considering the matching of computing power and computing requirements, the computing requirements of nodes in the initial stage of network repair also obey the uniform distribution on (10, 25) Gbit. Without loss of generality, it is assumed that the number of wired links in the original topology of the edge network is , the network topology is the same as the random network [4], and the data transmission between nodes is reachable everywhere. Considering the fluctuation range of processing power of computing nodes, the link capacity obeys a uniform distribution on (5, 15) Gbit. In order to simulate the large-scale damage of the network, in the following, unless otherwise specified, the link damage ratio . Assuming that the cost of repairing each damaged link is evenly distributed in pesos, the cost of discarding data due to insufficient computing power is peso/Gbit.

In order to verify the effect of the damaged network repair mechanism, the proposed algorithm is compared with the following benchmark algorithms. (1)Random repair algorithm. The damaged links in the network are randomly selected for repair, regardless of the specific topology of the network and the dynamic characteristics of network computing flow migration(2)Maximum connected graph repair algorithm [15]. Repair all damaged links in the maximum connected graph of the network to ensure that all nodes in the maximum connected graph of the network can reach a strong connected state(3)Betweenness centrality sorting repair algorithm [11]. The topological structure of the edge network before the damage is analyzed, the betweenness centrality of each wired link is sorted, and the damaged link with large betweenness centrality is preferentially repaired. The number of repaired links is the same as the proposed algorithm

5.2. Algorithm Convergence

Figure 3 shows the convergence comparison between the proposed Benders decomposition algorithm and the Benders decomposition acceleration algorithm. It can be seen from Figure 3 that the two algorithms can achieve fast iteration within a limited number of times and have good convergence. It should be noted that the number of iterations represents the total number of loop iterations of the main problem and subproblems in Algorithm 1 and Algorithm 3. In each iteration process, the computational complexity of the subproblem is , and the computational complexity of the main problem is , where is the inner loop iteration for solving the main problem frequency. Although the Benders decomposition acceleration algorithm reduces the total number of iterations only once compared to the Benders decomposition algorithm, its actual computational time complexity is reduced by . In a large-scale compromised network environment, the improvement of the computational time complexity is still considerable. From the comparison of the upper and lower bounds of the algorithm under the same number of iterations, it can be seen that, compared with the Benders decomposition algorithm, the local branch method-assisted Benders decomposition acceleration algorithm has a significantly improved convergence speed due to the introduction of deeper cutting planes and can be better adapt to the application requirements of large-scale networks. In addition, the total system cost of the Benders decomposition algorithm and the Benders decomposition acceleration algorithm tend to be consistent after convergence. Therefore, in the following, for the convenience of comparison with the benchmark algorithm, the Benders decomposition algorithm and the Benders decomposition acceleration algorithm are collectively referred to as the proposed algorithm.

5.3. Algorithm Performance

Figures 4 and 5 are the total system cost curves of the proposed algorithm, the random repair algorithm, the maximum connected graph repair algorithm, and the betweenness centrality sorting repair algorithm under different network damage degree and different network scales , respectively. It can be seen from Figures 4 and 5 that under different network damage degrees and network scales, the performance of the proposed algorithm is excellent due to the consideration of the network dynamic characteristics such as the computing demand and actual computing power of the nodes in the network and link capacity limitations on the benchmark algorithm. It is worth noting that the system overhead performance of the maximum connected graph repair algorithm is the worst among all algorithms, even weaker than the random repair algorithm, which is in good agreement with the state of network repair in real networks. In the real network, the repair process always makes the large and small independent clusters form in the network first, and at the end of the repair, the clusters are connected to form the maximum connected graph [13].

5.4. Multiscenario Deployment

Figures 6 and 7, respectively, show the number of damaged links repaired by the proposed algorithm and the amount of data discarded under different unit data discarding cost scenarios. Considering the double consideration of the total system overhead of the proposed algorithm for link repair cost and data discarding, with the increase of unit data discarding cost , the number of repaired links and the amount of data discarding show an opposite increase or decrease relationship. Consistent with experience, as increases, i.e., the cost of data discarding increases, the network tends to repair more links so that the computational demands can be met. When the value of is (1, 1.5) million/Gbit, the amount of data discarded in Figure 7 begins to drop significantly, because within this range, the system is just near the sensitive critical point. Around this value, the system has the strongest ability to balance the cost of repairing with the overhead of discarding data. Any small change in the value may bring about a larger change in equilibrium decision-making. After the exceeds 20,000 pesos/Gbit, the marginal benefit brought by continuing to repair damaged links is reduced, and the number of network repaired links and the amount of computing data discarded remain stable. It can be seen that the proposed algorithm can be well applied to a variety of different data discarding cost scenarios and has good scalability and adaptability.

In order to further analyze the performance of the algorithm in this paper in different network topology scenarios, this paper extends the network form from a single random network scenario to a grid network and a scale-free network [36]. Different from the random network, the degree of each node of the grid network is exactly the same, and the degree of the nodes of the scale-free network obeys a power-law distribution. As can be seen from Figure 8, under the three types of networks, the performance of each algorithm will fluctuate to varying degrees, but the overall system overhead performance of the algorithm in this paper is better than the benchmark algorithm. Thanks to the joint analysis of network topology and dynamic features, the algorithm in this paper has good adaptability to multiple scenarios.

In summary, it can be seen from the simulation results that the proposed method outperforms the existing methods in various parameters evaluation and different scenarios. This provides solid basis that the proposed approach has practical value in IIoT deployment.

6. Conclusion

Aiming at the vulnerable characteristics of edge computing networks in the IIoT, this paper proposes a repair mechanism after large-scale damage to the network and gives a joint optimization method of priority repair link set decision and computing migration configuration, which effectively alleviates the problem of the initial stage of network repair; there is a conflict between limited repair resources and a large amount of data computing requirements. Considering the difficulty of solving the original problem, the Benders decomposition algorithm is used to transform it into a main problem and subproblems that are easier to solve. Furthermore, combined with the local branching method, a Benders decomposition acceleration algorithm is designed, which effectively improves the convergence speed of the algorithm. The simulation results show that the proposed algorithm has better system repair performance compared to the existing topology-based repair algorithms.

Although for the sake of data fairness, this paper considers that the computing data has the same processing priority, that is, the cost per unit of data discarded by different nodes is the same. The subproblem solution can be replaced with the existing minimum cost flow algorithm (such as Dinic’s algorithm).

The proposed algorithm is mainly aimed at the situation where the nodes are connected by wired links. For scenarios with dynamic wireless links, such as the scenario where the UAV acts as a mobile edge node, the channel capacity changes with the location of the UAV, and issues such as the UAV’s trajectory and wireless spectrum allocation need to be further considered jointly. This will make the already complex network repair problem more difficult to solve, which is beyond the scope of this paper and is reserved for follow-up research.

Appendix

A.1. Benders Optimal Cut Proof

When is given, from the original problem , we can get:

The objective function of the equivalent dual problem of the above problem can be written as:

Among them, optimizes variables (dual variables) for the four sets of dual problems. In the th iteration process, it is assumed that the solution of the above dual variable set is , the optimal solution of the problem , and then we have

From linearization operation around , we get:

Data Availability

The data used for the findings of this study is available upon from the authors.

Conflicts of Interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Authors’ Contributions

Conceptualization was contributed by Hongyang Huang and Imran Khan; data curation was contributed by M. Dauwed and M. Derbali; formal analysis was contributed by Sun Li and Kai Chen; funding acquisition was performed by Sangsoon Lim; supervision was performed by Imran Khan and Sangsoon Lim.

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No. 2021R1F1A1063319).