A New Graph Vulnerability Parameter: Fuzzy Node Integrity
Abstract
:1. Introduction
1.1. Literature Review
1.2. Problem Statement
1.3. Research Gap
1.4. Main Contributions
- Establishing general formulae for the fuzzy node integrity of various graph structures, including cycle graphs, wheel graphs, and star graphs, which exhibit different degrees of structural symmetry.
- Enhancing existing measures by introducing a parameter that balances both local and global structural resilience, capturing more subtle changes in network robustness than classical integrity measures. Unlike traditional integrity and connectivity metrics, the proposed measure accounts for gradual degradations in network strength rather than treating failures as binary disconnections.
- Providing a general and flexible framework that can be applied to a wide range of real-world problems, including transportation systems, communication networks, and cybersecurity, where network stability is influenced by uncertainty.
2. Preliminaries
3. Fuzzy Node Integrity
- : The strong weight of the fuzzy node cut S, defined in [26], is calculated as the sum of membership values:
- : The strength of connectedness between nodes u and v in the residual graph .
- : The residual strength of connectedness is the maximum of the strengths of all paths among the nodes with diminishing strength of connectedness in the residual graph, defined in [35] as
- Node Cut : The residual strength of connectedness is, and the strong weight of the node cut is . Combining these values, the fuzzy node integrity is
- Node Cut : Removing and , the residual strength of connectedness is , and the strong weight of this cut is . Thus,
- Node Cut : Removing , , and , only remains, leaving no connections in the residual graph. The strong weight is , and . Therefore,
4. Real-World Case Study: Military Logistics
4.1. Problem Definition
4.2. Application of Fuzzy Node Integrity to Military Logistics
- Finding the adjacency matrix of the fuzzy graph G, which is given in Figure 3.
- Finding the matrix including strength of connectedness for all possible node pairs.
- Determining the strong arcs.
- Finding the strongest weights of all nodes.
- Determining fuzzy cut nodes.
- Computing fuzzy node connectivity to identify the network’s weakest nodes and fuzzy node integrity to estimate the impact of node failures.
- Step 1: The adjacency matrix represents the membership values of the arcs between the nodes and given in Table 2.
- Step 2: The strength of the connectedness matrix represents the strength of connectedness between the nodes and , denoted by , which is the maximum of the strengths of all paths between these nodes given in Table 2.
- Step 3: If , then the arc between the nodes and is called a strong arc; otherwise, it is a -arc. If the off-diagonal entries of the strength of the connectedness matrix are equal to the non-zero off-diagonal entries of the adjacency matrix, then the corresponding arcs are called strong arcs. Checking these matrices gives the set of strong arcs for the fuzzy graph G. To decide if the arcs are -strong or -strong, we made a table to check if either for -strong or for -strong.
- Step 4: The strong weight of a node v is the minimum of the weights of strong arcs incident on v. The strongest weight of each node of G is given in Table 4.
- Step 5: The nodes are fuzzy cut nodes since each one is a common node of at least two -strong arcs [30].
- Step 6: The calculations are summarized in Table 5, which displays key values, such as fuzzy cut nodes; corresponding strong weights; the strength of connectedness and , where the values decrease for those nodes after removing S; the residual strength of connectedness ; and fuzzy node integrity values corresponding to the fuzzy cut nodes.
4.3. Comparative Analysis
- Failure Impact: The measure in which a method incorporates node failures and how they impact network connectivity.
- Adaptability to Uncertainty: Whether or not the measure uses fuzzy or probabilistic aspects to deal with uncertainty.
- Resilience Estimation: The ability of the method to quantify remaining connectivity following disturbances.
- Alternative Path Planning: If the method provides alternative route suggestions in cases of failures.
5. Results and Discussion
5.1. Key Insights from the Case Study
- Identification of Critical Nodes: The strategy was able to determine nodes whose removal would result in a substantial loss in the resilience of the network. This was especially true when taking into account the network’s nodes of passage, which are the nodes with the least strong weight but the highest difficulty.
- Scenario-based Analysis: The following two main failure scenarios were analyzed:
- –
- Targeted Node Failures: The removal of nodes with least strong weight affected the strength of connectedness by reducing the overall efficiency of the logistics network. The outcome showed a drop in network connectivity when critical nodes were targeted.
- –
- Random Node Failures: The network could tolerate some node failures with the backup routes still being effective. The capability of the system to reroute logistics was still maintained with node failures.
- Quantitative Performance Comparison:
- –
- Integrity for fuzzy graph is useless for this problem. It cannot be evaluated in these kinds of graphs since the definition depends only on the disconnection and the membership values of nodes.
- –
- Fuzzy node connectivity shows enhanced flexibility compared to traditional approaches while still being short of full resilience.
- –
- Fuzzy node integrity proves its high resilience estimation performance by providing information not only about the critical node but also about which arcs need to be strengthened.
- Real-Time Flexibility: The study showed how, by recalculating fuzzy node integrity in real time, logistical operations can be reallocated dynamically to optimize routes in line with fluctuating conditions, such as unexpected disruptions or road obstructions.
5.2. Practical Implications
- Transport Networks: Enhancing the resilience of road and rail networks against disruptions.
- Cybersecurity: Applying fuzzy node integrity to assess network vulnerability in critical communication infrastructures.
- Disaster Management: Planning for emergency responses in dynamic environments.
- Supply Chain Optimization: Identifying vulnerabilities in supply chains to ensure efficient distribution of products.
5.3. Limitations and Future Work
- Static Network Assumption: We have assumed a static network in this model, but real-world military logistics networks are highly dynamic in nature. Future research studies should incorporate real-time adaptability in line with time-dependent fuzzy graphs.
- Computational Complexity: The calculation for fuzzy node integrity is becoming complex as network sizes expand. Future studies should concentrate on creating efficient techniques for dealing with real-time large-scale networks.
- Limited Real-World Evaluation: The method is established in a theoretical case study but is in need of empirical testing in real logistics networks in order to validate its effectiveness.
- Interdependency Considerations: Interdependent networks are normally engaged in logistics in armed conflicts, such as supply networks and communications networks. The application may be extended to cover multi-layer fuzzy networks.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Harary, F. Graph Theory; Addison-Wesley Publishing Company Inc.: Reading, MA, USA, 1969. [Google Scholar]
- Barefoot, C.A.; Entringer, H.R.; Swart, H. Vulnerability in graphs—a comparative survey. J. Comb. Math. Comb. Comput. 1987, 1, 13–22. [Google Scholar]
- Cozzens, M.B.; Moazzami, D.; Stueckle, S. The tenacity of a graph. In Graph Theory, Combinatorics, and Algorithms; Alavi, Y., Allen, S., Eds.; Wiley: New York, NY, USA, 1995; pp. 1111–1112. [Google Scholar]
- Chvátal, V. Tough graphs and Hamiltonian circuits. Discret. Math. 1973, 5, 215–228. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, S.; Li, X. Rupture degree of a graph. Int. J. Comput. Math. 2005, 82, 793–803. [Google Scholar] [CrossRef]
- Rosenfeld, A. Fuzzy graphs. In Fuzzy Sets and Their Applications to Cognitive and Decision Processes; Academic Press: Washington, DC, USA, 1975; pp. 77–95. [Google Scholar]
- Yeh, R.T.; Bang, S.Y. Fuzzy relations, fuzzy graphs and their applications to clustering analysis. In Fuzzy Sets and Their Applications to Cognitive and Decision Processes; Academic Press: Washington, DC, USA, 1975; pp. 25–149. [Google Scholar]
- Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
- Al-Shamiri, M.M.A.; Ahmad, U.; Maryam, A.; Akram, M. Cubic directed graphs with application. J. Appl. Math. Comput. 2024, 70, 2169–2196. [Google Scholar] [CrossRef]
- Ahmad, U.; Batool, T. Domination in rough fuzzy digraphs with application. Soft Comput. 2023, 27, 2425–2442. [Google Scholar] [CrossRef]
- Muhammad, A.; Shareef, A.; Al-Kenani, A.N. Pythagorean fuzzy incidence graphs with application in one-way toll road network. Granul. Comput. 2024, 9, 39. [Google Scholar]
- Islam, S.R.; Pal, M. Hyper-Wiener index for fuzzy graph and its application in share market. J. Intell. Fuzzy Syst. 2021, 41, 2073–2083. [Google Scholar] [CrossRef]
- Islam, S.R.; Pal, M. Second Zagreb index for fuzzy graphs and its application in mathematical chemistry. Iran. J. Fuzzy Syst. 2023, 20, 119–136. [Google Scholar]
- Islam, S.R.; Pal, M. Hyper-connectivity index for fuzzy graph with application. Twms J. Appl. Eng. Math. 2023, 13, 920–936. [Google Scholar]
- Islam, S.R.; Pal, M. Multiplicative version of first Zagreb index in fuzzy graph and its application in crime analysis. Proc. Natl. Acad. Sci. India Sect. A Phys. Sci. 2024, 94, 127–141. [Google Scholar]
- Islam, S.R.; Pal, M. An investigation of edge F-index on fuzzy graphs and application in molecular chemistry. Complex Intell. Syst. 2023, 9, 2043–2063. [Google Scholar]
- Wang, H.; Yu, X.; Lu, Y. A reinforcement learning-based ranking teaching-learning-based optimization algorithm for parameters estimation of photovoltaic models. Swarm Evol. Comput. 2025, 93, 101844. [Google Scholar]
- Sujithra, P.; Mathew, S.; Mordeson, J.N. Advanced fuzzy connectivity metrics for enhancing security in dynamic network environments. Inf. Sci. 2025, 700, 121857. [Google Scholar]
- Dhanya, C.M.; Mathew, S.; Mordeson, J.N. Connectivity in Cartesian products of fuzzy graphs: Application to decision making. J. Appl. Math. Comput. 2025. [Google Scholar] [CrossRef]
- Prabhath, A.; Mathew, S.; Mordeson, J.N. Generalized cycle connectivity in fuzzy graphs. Fuzzy Sets Syst. 2024, 482, 108909. [Google Scholar]
- Ma, J.; Li, Q.; Zhou, X. Fuzzy edge connectivity and fuzzy local edge connectivity with applications to communication networks. Fuzzy Sets Syst. 2021, 410, 109–125. [Google Scholar]
- Ma, J.; Li, L.; Li, J. Fuzzy average edge connectivity with its application to communication networks. Soft Comput. 2023, 27, 1367–1378. [Google Scholar]
- Ganesan, B.; Raman, S.; Pal, M. Strong domination integrity in graphs and fuzzy graphs. J. Intell. Fuzzy Syst. 2022, 43, 2619–2632. [Google Scholar]
- Saravanan, M.; Sujatha, R.; Sundareswaran, R. A study on regular fuzzy graphs and integrity of fuzzy graphs. Int. J. Appl. Eng. Res. 2015, 10, 160–164. [Google Scholar]
- Saravanan, M.; Sujatha, R.; Sundareswaran, R. Integrity of fuzzy graphs. Bull. Int. Math. Virtual Inst. 2016, 6, 89–96. [Google Scholar]
- Mathew, S.; Sunitha, M.S. Node connectivity and arc connectivity in fuzzy graphs. Inf. Sci. 2010, 180, 519–531. [Google Scholar]
- Binu, M.; Mathew, S.; Mordeson, J.N. Connectivity index of a fuzzy graph and its application to human trafficking. Fuzzy Sets Syst. 2019, 360, 117–136. [Google Scholar]
- Murater, F.N.; Bacak Turan, G.; Aslan, E. Bulanık çizgelerde zedelenebilirlik parametreleri: Bulanık tepe kararlılık değeri. J. Inst. Sci. Technol. 2025, 15, 316–329. [Google Scholar]
- Murater, F.N.; Bacak-Turan, G. Fuzzy node connectivity of some classes of graphs. J. Mod. Technol. Eng. 2024, 9, 2. [Google Scholar]
- Mathew, S.; Sunitha, M.S. Types of arcs in a fuzzy graph. Inf. Sci. 2009, 179, 1760–1768. [Google Scholar]
- Mordeson, J.N.; Nair, P.S. Fuzzy Graphs and Fuzzy Hypergraphs; Physica-Verlag: Heidelberg, Germany, 2000. [Google Scholar]
- Bhutani, K.R.; Rosenfeld, A. Strong arcs in fuzzy graphs. Inf. Sci. 2003, 152, 319–323. [Google Scholar]
- Bhutani, K.R.; Mordeson, J.N.; Rosenfeld, A. On degrees of end nodes and cut nodes in fuzzy graphs. Iran. J. Fuzzy Syst. 2004, 1, 57–64. [Google Scholar]
- Bhutani, K.R.; Rosenfeld, A. Fuzzy end nodes in fuzzy graphs. Inf. Sci. 2003, 152, 323–326. [Google Scholar]
- Altundag, F.N. Vulnerability Parameters of Fuzzy Graphs. PhD Thesis, Manisa Celal Bayar University, Manisa, Turkey, 2021. [Google Scholar]
- Mathew, S.; Sunitha, M.S. Menger’s theorem for fuzzy graphs. Inf. Sci. 2013, 222, 717–726. [Google Scholar]
- Gani, A.N.; Radha, K. On regular fuzzy graphs. J. Phys. Sci. 2008, 12, 33–40. [Google Scholar]
- Tom, M.; Sunitha, M.S. Strong sum distance in fuzzy graphs. SpringerPlus 2015, 4, 214. [Google Scholar] [PubMed]
- Lytvynenko, V.; Lytvynenko, O. Application of fuzzy graph models for finding rational routes. Adv. Mil. Technol. 2016, 10, 21–29. [Google Scholar]
S | ||||||
---|---|---|---|---|---|---|
0.3 | 0.3 | − | 0.3 | − | ||
0.2 | 0.3 | 0.2 | 0.3 | 0.5 | ||
0.2 | 0.4 | 0.2 | 0.3 | 0.5 | ||
0.2 | 0.4 | 0.2 | 0.6 | 0.8 | ||
0 | 0.3 | 0 | 0.6 | 0.6 | ||
0.5 | 0.5 | − | 0.6 | 0.6 | ||
− | − | 0 | 0.9 | 0.9 | ||
− | − | 0 | 1.1 | 1.1 | ||
− | − | 0 | 1.1 | 1.1 |
A | ||||||||
0 | 0.5 | 1.0 | 0.9 | 0.0 | 0.0 | 0.0 | 0.0 | |
0.5 | 0 | 0.9 | 0.0 | 0.9 | 0.8 | 0.0 | 0.0 | |
1.0 | 0.9 | 0 | 0.7 | 0.8 | 0.0 | 0.0 | 0.0 | |
0.9 | 0.0 | 0.7 | 0 | 0.7 | 0.0 | 0.7 | 0.0 | |
0.0 | 0.9 | 0.8 | 0.7 | 0 | 1.0 | 0.5 | 1.0 | |
0.0 | 0.8 | 0.0 | 0.0 | 1.0 | 0 | 0.0 | 0.5 | |
0.0 | 0.0 | 0.0 | 0.7 | 0.5 | 0.0 | 0 | 0.5 | |
0.0 | 0.0 | 0.0 | 0.0 | 1.0 | 0.5 | 0.5 | 0 | |
C | ||||||||
0 | 0.9 | 1.0 | 0.9 | 0.9 | 0.9 | 0.7 | 0.9 | |
0.9 | 0 | 0.9 | 0.9 | 0.9 | 0.9 | 0.7 | 0.9 | |
1.0 | 0.9 | 0 | 0.9 | 0.9 | 0.9 | 0.7 | 0.9 | |
0.9 | 0.9 | 0.9 | 0 | 0.9 | 0.9 | 0.7 | 0.9 | |
0.9 | 0.9 | 0.9 | 0.9 | 0 | 1.0 | 0.7 | 1.0 | |
0.9 | 0.9 | 0.9 | 0.9 | 1.0 | 0 | 0.7 | 1.0 | |
0.7 | 0.7 | 0.7 | 0.7 | 0.7 | 0.7 | 0 | 0.7 | |
0.9 | 0.9 | 0.9 | 0.9 | 1.0 | 1.0 | 0.7 | 0 |
Strength | |||
---|---|---|---|
1 | 0.7 | -strong | |
0.9 | 0.7 | -strong | |
0.9 | 0.8 | -strong | |
0.9 | 0.8 | -strong | |
0.7 | 0.5 | -strong | |
1 | 0.8 | -strong | |
1 | 0.5 | -strong |
v | ||||||||
---|---|---|---|---|---|---|---|---|
0.9 | 0.9 | 0.9 | 0.7 | 0.9 | 1 | 0.7 | 1 |
S | ||||||
---|---|---|---|---|---|---|
{} | 0.9 | 0.7 | 0.7 | 0.9 | 1.6 | |
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
{} | 0.9 | 0.8 | 0.8 | 0.9 | 1.7 | |
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
{} | 0.9 | 0.7 | 0.7 | 0.9 | 1.6 | |
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
0.9 | 0.7 | |||||
{} | 0.7 | 0.5 | 0.5 | 0.7 | 1.2 | |
0.7 | 0.5 | |||||
0.7 | 0.5 | |||||
0.7 | 0.5 | |||||
0.7 | 0.5 | |||||
0.7 | 0.5 | |||||
{} | 0.9 | 0.8 | 0.8 | 0.9 | 1.7 | |
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.8 | |||||
0.9 | 0.5 | |||||
0.9 | 0.5 | |||||
0.9 | 0.5 | |||||
0.9 | 0.5 | |||||
1.0 | 0.5 | |||||
0.7 | 0.5 |
Method | Failure Impact | Uncertainty Adaptation | Resilience Estimation | Alternative Path Planning | Numerical Value |
---|---|---|---|---|---|
Integrity | Binary Disconnection | No | No | No | Not Suitable for this Graph |
Fuzzy Node Connectivity | Partial Failure Consideration | Yes | No | Limited | 0.7 |
Fuzzy Node Integrity (Proposed) | Strength-Based Failure Consideration | Yes | Yes | Yes | 1.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Murater, F.N.; Bacak-Turan, G. A New Graph Vulnerability Parameter: Fuzzy Node Integrity. Symmetry 2025, 17, 474. https://doi.org/10.3390/sym17040474
Murater FN, Bacak-Turan G. A New Graph Vulnerability Parameter: Fuzzy Node Integrity. Symmetry. 2025; 17(4):474. https://doi.org/10.3390/sym17040474
Chicago/Turabian StyleMurater, Ferhan Nihan, and Goksen Bacak-Turan. 2025. "A New Graph Vulnerability Parameter: Fuzzy Node Integrity" Symmetry 17, no. 4: 474. https://doi.org/10.3390/sym17040474
APA StyleMurater, F. N., & Bacak-Turan, G. (2025). A New Graph Vulnerability Parameter: Fuzzy Node Integrity. Symmetry, 17(4), 474. https://doi.org/10.3390/sym17040474