Next Article in Journal
Spectrum-Constrained and Skip-Enhanced Graph Fraud Detection: Addressing Heterophily in Fraud Detection with Spectral and Spatial Modeling
Next Article in Special Issue
Some Properties of Boolean-like Laws in Fuzzy Logic
Previous Article in Journal
Homochirality Emergence: A Scientific Enigma with Profound Implications in Origins of Life Studies
Previous Article in Special Issue
The Neutrosophization of δ-Separation Axioms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Graph Vulnerability Parameter: Fuzzy Node Integrity

by
Ferhan Nihan Murater
and
Goksen Bacak-Turan
*
Department of Mathematics, Manisa Celal Bayar University, Manisa 45140, Turkey
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(4), 474; https://doi.org/10.3390/sym17040474
Submission received: 9 February 2025 / Revised: 14 March 2025 / Accepted: 19 March 2025 / Published: 21 March 2025

Abstract

:
Robustness in networks plays a vital role in mitigating the effects of failures caused by nodes or links, which can disrupt essential services. Among the various vulnerability parameters in graph theory, such as connectivity and integrity, their applications to fuzzy graphs remain underexplored, despite fuzzy graphs being a powerful tool for modeling uncertainty. In this paper, we introduce the parameter ’fuzzy node integrity’, which considers both the number of disrupted elements and the strength of residual connections. We derive general formulas for different types of symmetric and asymmetric fuzzy graph structures, including cycle graphs, wheel graphs, and star graphs, to systematically demonstrate the utility of this parameter. The proposed parameter is then applied to a military logistics problem to gain insights into the identification of critical nodes and route optimization under uncertainty. This study bridges an important gap in fuzzy graph theory by redefining node integrity through the inclusion of connection strength, offering a promising tool for assessing network vulnerability. These findings lay the foundation not only for theoretical research but also for practical improvements in transportation, disaster management, and communication networks.

1. Introduction

Most modern systems consist of networks, including communication networks, transportation systems, and infrastructures for water distribution. In each of these, a failure in either a node or a link can have serious repercussions on their functions, underlining the importance of parameters related to their vulnerability in studies. Connectivity, integrity, tenacity, toughness, and rupture degree are some of the metrics for network vulnerability that are indispensable for understanding the resilience of a network to disruption and for developing effective measures to strengthen its resistance [1,2,3,4,5].

1.1. Literature Review

Fuzzy graphs were first proposed by Rosenfeld [6] and Yeh and Bang [7], based on the fuzzy sets and fuzzy relations introduced by Zadeh [8]. Thus, graph theory has been systematically extended to account for uncertainties in real-world systems. By allowing the relationships between nodes to be expressed as a degree of membership from 0 to 1, the representation using fuzzy graphs becomes seamless in modeling network dynamics. This flexibility makes fuzzy graphs even more useful for modeling systems where information is uncertain, imprecise, or incomplete.
Fuzzy graphs have applications in various fields, including research on directed networks, rough fuzzy digraphs, and toll road networks [9,10,11], as well as indices such as the Hyper–Wiener index and Zagreb indices, with applications in areas like the stock market, chemistry, and crime analysis [12,13,14,15,16]. Despite some advancements in fuzzy graph research, studies on its vulnerability parameters remain scarce compared to classical graph theory. Recent works investigated numerous methods for evaluating network vulnerabilities in the context of uncertainty, such as optimization-based methods [17]. Nevertheless, fuzzy graph-based methods remain critical in order to represent the gradual decline in network resilience. A few pioneering works have introduced new vulnerability concepts in fuzzy graphs, such as those by [18,19,20,21], which explore resilience against different types of structural attacks. Other advanced studies have examined various aspects of fuzzy connectivity, including generalized cycle connectivity [20], edge connectivity measures [21,22], and strong domination integrity [23]. Although these studies have significantly contributed to understanding fuzzy graph vulnerability, they fail to adequately capture the role of connection strength in maintaining network resilience.

1.2. Problem Statement

Network vulnerability has long been studied in classical graph theory, with integrity being one of the primary parameters used to measure network robustness. Integrity is typically defined as the sum of the number of disconnected components and the size of the largest remaining connected subgraph after disruption [2]. In fuzzy graphs, node failure does not necessarily lead to disconnection but rather to a reduction in the strength of connectedness between nodes. Existing definitions, such as those proposed by Saravanan et al. [24,25], fail to account for this and consider only the disconnection of graphs. Moreover, existing studies on fuzzy graph vulnerability do not explicitly address the role of network topology and redundancy in connectivity in resisting network failures.

1.3. Research Gap

Although integrity metrics have been extensively investigated in classical graphs, their extension to fuzzy graphs remains in its early stages. A fundamental gap exists in formulating a vulnerability index that captures the strength of connectedness between nodes rather than merely their disconnection. While some studies have explored connectivity measures in fuzzy graphs [26,27], they fail to account for the dynamic process of node failures and their impact on the residual network structure. Recent research on fuzzy graph-based vulnerability analysis [22,28] has proposed alternative approaches; however, these still lack an integrated framework that coherently incorporates both uncertainty and robustness.

1.4. Main Contributions

This study introduces a novel approach to measuring vulnerability, termed fuzzy node integrity. This method utilizes the strength of connectedness to assess network robustness under uncertainty. The key contributions of this study are as follows:
  • Redefining the integrity parameter of fuzzy graphs to incorporate the strength of connectedness, providing a more comprehensive measure of network vulnerability and extending earlier works [23,29].
  • Establishing general formulae for the fuzzy node integrity of various graph structures, including cycle graphs, wheel graphs, and star graphs, which exhibit different degrees of structural symmetry.
  • Demonstrating the utility of the proposed measure through its application to a real-world military logistics problem, where fuzzy node integrity is used for critical node detection and route optimization under uncertainty, building upon previous works [10,15].
  • Enhancing existing measures by introducing a parameter that balances both local and global structural resilience, capturing more subtle changes in network robustness than classical integrity measures. Unlike traditional integrity and connectivity metrics, the proposed measure accounts for gradual degradations in network strength rather than treating failures as binary disconnections.
  • Providing a general and flexible framework that can be applied to a wide range of real-world problems, including transportation systems, communication networks, and cybersecurity, where network stability is influenced by uncertainty.
By addressing these limitations, this study contributes to the theoretical advancement of fuzzy graph vulnerability metrics and their application to real-world network systems. Future research will explore extensions of fuzzy node integrity to dynamic and time-evolving networks.
This research contributes both theoretically and practically by deriving general formulae for specific fuzzy graph structures and presenting an application to a military logistics case study, demonstrating its potential utility. Although this study highlights possible applications in fields such as disaster management and infrastructure planning, it serves as an initial step toward broader implementation. The role of symmetry in network failure scenarios can be further explored in future studies to refine these metrics. Future research should focus on further improving this metric, developing computationally efficient algorithms for large-scale networks, and exploring its applications in dynamic and evolving systems.

2. Preliminaries

Some fundamental definitions are provided in this section. Those not included here can be found in [26,30,31].
Definition 1
([32]). A fuzzy graph, referred to as an f-graph, is a structure G = ( V , σ , μ ) , where V is the set of nodes, σ is a fuzzy subset of V, and μ is a fuzzy relation on σ, such that μ ( u , v ) σ ( u ) σ ( v ) , u , v V .
Definition 2
([33]). An arc with the least membership value is called the weakest arc. Let d ( μ ) = { μ ( u , v ) ( u , v ) μ * } and h ( μ ) = { μ ( u , v ) ( u , v ) μ * } .   d ( μ ) is called the depth of μ and h ( μ ) is called the height of μ.
Definition 3
([32]). A fuzzy cycle is referred to as a multimin cycle if it has more than one weakest arc. It is called a locamin cycle if every node is incident with a weakest arc.
Definition 4
([34]). The strength of connectedness between two nodes, u and v, which is the maximum of the strengths of all paths between them, is represented by C O N N G ( u , v ) . A fuzzy graph G = ( V , σ , μ ) is connected if, for every u , v in σ * ,   C O N N G ( u , v ) > 0 .
We accept that G is connected throughout this paper.
Definition 5
([30]). Let ( u , v ) be an arc of G. It is called α-strong, if μ ( u , v ) > C O N N G ( u , v ) ( u , v ) ; if μ ( u , v ) = C O N N G ( u , v ) ( u , v ) , then it is β-strong, and if μ ( u , v ) < C O N N G ( u , v ) ( u , v ) , then it is called a δ-arc.
Definition 6
([32]). If ( u , v ) is a strong arc, then u and v are strong neighbors, and an u v path P is called a strong path if all the arcs in P are strong.
Definition 7
([30]). If the removal of an arc reduces the strength of connectedness between any pair of nodes, then that arc is called a fuzzy bridge. Accordingly, if the removal of a node results in a reduction in the strength of connectedness between any pair of nodes, then it is referred to as a fuzzy cut node. A connected fuzzy graph G = ( V , σ , μ ) is a block if G has no fuzzy cut nodes. If a node has at most one strong arc incident with it, it is called a fuzzy end node of G.
Definition 8
([35]). Let G = ( V , σ , μ ) be a fuzzy graph where | μ * | = m . Then, { q 1 , q 2 , , q m 1 , q m } is called the arc-strength sequence of G with q 1 q 2 q 2 q m 1 q m where q i is the strength of arc i for 0 < q i 1 . Specifically, q 1 is the depth of μ and q m is the height of μ .
Definition 9
([26]). Let G = ( V , σ , μ ) be a connected fuzzy graph. Fuzzy node cut (FNC) is defined as a collection of nodes S = { v 1 , v 2 , , v m } , for each pair of nodes u , v σ * and u , v v i for i = 1 , 2 , , m , if either C O N N G S ( u , v ) < C O N N G ( u , v ) or G S is trivial.
If there are m nodes in S , then S is called an m F N C . Obviously, a 1 F N C is a singleton set S = { u } , where u is a fuzzy cut node.
Definition 10
([26]). Let S be a fuzzy node cut in G. The strong weight of S, denoted by s ( S ) , is defined as s ( S ) = u S μ ( u , v ) , where μ ( u , v ) is the minimum of the weights of strong arc incident on u.
Definition 11
([26]). The least strongest weight of fuzzy node cuts of a connected fuzzy graph G is called the fuzzy node connectivity of G. It is denoted by κ ( G ) .

3. Fuzzy Node Integrity

The concept of integrity for fuzzy graphs, as initially defined by Saravanan et al. [24], is
I ˜ = m i n { | S | + m ( G S ) : S V }
where | S | denotes the sum of membership values of nodes in S, and m ( G S ) is the total membership value of the largest connected component in G S . However, this definition does not take into consideration the strength of connectedness, which is an indispensable characteristic for network vulnerability modeling under uncertainty.
To handle this limitation, we have introduced a new parameter, fuzzy node integrity, which includes the strength of connectedness and thereby provides a more refined degree of network robustness under uncertain conditions.
Definition 12.
The fuzzy node integrity of a connected fuzzy graph G is
I f ( G ) = min { s ( S ) + m f ( G S ) : S σ * }
where
  • s ( S ) : The strong weight of the fuzzy node cut S, defined in [26], is calculated as the sum of membership values:
    s ( S ) = u S μ ( u , v )
    where μ ( u , v ) is the minimum of the membership values of strong arcs incident on u.
  • C O N N G S ( u , v ) : The strength of connectedness between nodes u and v in the residual graph G S .
  • m f ( G S ) : The residual strength of connectedness is the maximum of the strengths of all paths among the nodes with diminishing strength of connectedness in the residual graph, defined in [35] as
m f ( G S ) = max { C O N N G S ( u , v ) : C O N N G S ( u , v ) < C O N N G ( u , v ) }
where u , v σ * S . If G S is trivial, then m f ( G S ) = 0 .
Any set S of nodes that realizes the integrity value is called an I f -set.
The fuzzy node integrity parameter extends traditional metrics by incorporating the strength of connectedness into vulnerability analysis. It provides a systematic approach for evaluating network robustness in uncertain environments and lays the groundwork for further theoretical and practical developments.
In practical applications, membership values express the notion of reliability or strength of nodes and edges represented by σ ( u ) and μ ( u , v ) , respectively. These values will be determined based on real factors, such as terrain conditions, node reliability, traffic flow capacities, etc. In real-world applications, membership values may be estimated by expert judgment, data analysis, or simulations of one form or another, depending upon the system being modeled.
The newly defined parameter fuzzy node integrity value for a simple graph given in Figure 1 is evaluated in detail in the following example.
Example 1.
To compute the fuzzy node integrity I f ( G ) of the fuzzy graph G shown in Figure 1, we will analyze all possible node cuts S. The membership values and the types of arcs, α-strong, β-strong or δ-arc, are given in the figure. The strong weight of each node is obtained as follows:
s ( u 1 ) = min { μ ( u 1 , u 2 ) , μ ( u 1 , u 3 ) , μ ( u 1 , u 4 ) } = 0.3 , s ( u 2 ) = μ ( u 1 , u 2 ) = 0.3 , s ( u 3 ) = min { μ ( u 1 , u 3 ) , μ ( u 2 , u 3 ) } = 0.3 , s ( u 4 ) = μ ( u 1 , u 4 ) = 0.5 .
The calculations are summarized in Table 1, which displays key values such as the strong weight s ( S ) , the strength of connectedness C O N N G ( u , v ) , the residual strength of connectedness m f ( G S ) , and the resulting fuzzy node integrity I f ( G ) .
From Table 1, we observe the following:
  • Node Cut S = { u 1 } : The residual strength of connectedness is m f ( G S ) =
    max { C O N N G S ( u 2 , u 4 ) , C O N N G S ( u 3 , u 4 ) } = 0.2 , and the strong weight of the node cut is s ( S ) = 0.3 . Combining these values, the fuzzy node integrity is
    I f ( G ) = s ( S ) + m f ( G S ) = 0.5 .
  • Node Cut S = { u 1 , u 2 } : Removing u 1 and u 2 , the residual strength of connectedness is m f ( G S ) = C O N N G S ( u 3 , u 4 ) = 0.2 , and the strong weight of this cut is s ( S ) = 0.6 . Thus,
    I f ( G ) = 0.6 + 0.2 = 0.8 .
  • Node Cut S = { u 1 , u 2 , u 3 } : Removing u 1 , u 2 , and u 3 , only u 4 remains, leaving no connections in the residual graph. The strong weight is s ( S ) = 0.9 , and m f ( G S ) = 0 . Therefore,
    I f ( G ) = 0.9 .
By analyzing all possible cuts, the minimum fuzzy node integrity value of the fuzzy graph given in Figure 1 is
I f ( G ) = min { 0.5 , 0.8 , 0.9 } = 0.5 .
The fuzzy node integrity value for a fuzzy wheel graph given in Figure 2 is evaluated in the following example.
Example 2.
According to Figure 2, let us consider the possible fuzzy node cuts.
For S 1 = { u 1 } , s ( S 1 ) = 0.1 and
C O N N G S 1 ( u 12 , u 2 ) = 0.7 < C O N N G ( u 12 , u 2 ) = 1 ,
and for S 2 = { u 6 } , s ( S 2 ) = 0.1 and
C O N N G S 2 ( u 5 , u 7 ) = 0.7 < C O N N G ( u 5 , u 7 ) = 0.8 .
Also, S 3 = { u 7 } ,   S 4 = { u 8 } ,   S 5 = { u 11 } ,   S 6 = { u 12 } are the only 1-FNC of G. We obtain m f ( G S ) = 0.7 for 1-FNC of G by definition. So, I f ( G ) 0.8 .
For S 7 = { u 6 , u 8 } , C O N N G S 7 ( u 5 , u 7 ) = 0.1 < C O N N G ( u 5 , u 7 ) = 0.8 , s ( S 7 ) = 0.2 and m f ( G S 7 ) = 0.1 . Hence, I f ( G ) 0.3 .
For S 8 = { u 7 , u 8 } , C O N N G S 8 ( u 6 , u 9 ) = 0.7 < C O N N G ( u 6 , u 9 ) = 0.9 and s ( S 8 ) = 0.2 . Thus, m f ( G S 8 ) = 0.7 and I f ( G ) 0.9 .
For S 9 = { u 2 , u 8 , u 13 } , C O N N G S 9 ( u 7 , u 9 ) = 0 < C O N N G ( u 7 , u 9 ) = 1 and s ( S 9 ) = 0.3 . Then, m f ( G S 9 ) = 0 . So, I f ( G ) 0.3 .
Among the fuzzy node cuts of G, S 7 and S 9 are I f sets of G. By taking the minimum, we obtain I f ( G ) = 0.3 , according to the definition of fuzzy node integrity.
To determine the fuzzy node connectivity of the fuzzy graph in Figure 2, the fuzzy node cut of G with the minimum strong weight is S = { u 1 } , where s ( S ) = 0.1 and C O N N G S ( u 12 , u 2 ) = 0.7 < C O N N G ( u 12 , u 2 ) = 1 . Thus, κ ( G ) = 0.1 . In addition, each of the nodes in { u 6 , u 7 , u 8 , u 11 , u 12 } provides the fuzzy node connectivity value since all the 1-FNC sets have the same strong weight value.
This example shows that the fuzzy node cuts may not be the same, which gives the fuzzy node connectivity and the fuzzy node integrity values for a fuzzy graph.
The general formulas for the fuzzy node integrity values of different types of fuzzy graphs are obtained and given below.
Theorem 1.
Let us consider the fuzzy wheel graph W n , where node u n is a fuzzy hub and the remaining nodes are located on the fuzzy cycle C n 1 . Moreover, assume that the membership values of the arcs between nodes u n and u i are no greater than that of the weakest arc on the cycle, μ ( u n , u i ) μ ( e ) for e E ( C n 1 ) , where all of the membership values of the arcs on the cycle are distinct. Consequently, the fuzzy node integrity value is
I f ( W n ) = 2 d ( μ ) , if there is a FCN ; 3 d ( μ ) , otherwise .
Proof. 
All the paths on the fuzzy wheel graph W n are strong paths. Since a strong path contains only α -strong or β -strong arcs, the weakest arcs of W n are β -strong and the rest of the arcs are α -strong. Apart from i = 1 , , n 1 , the membership values of the arcs ( u n , u i ) and weakest arcs on the fuzzy cycle C n 1 are equal; thus, μ ( u n , u i ) = d ( μ ) . Moreover, all the nodes u i for i = 1 , , n 1 are adjacent to the fuzzy hub u n . By the definition of the fuzzy wheel graph, we obtain s ( u i ) = d ( μ ) . Thus, there are two cases according to the existence of a fuzzy cut node of W n since μ ( u n , u i ) μ ( e ) for i = 1 , , n 1 .
Case i. Let fuzzy wheel graph W n contain a fuzzy cut node, e.g., x, and let S be a fuzzy node cut such that S = { x } . Fuzzy hub u n is not a fuzzy cut node since all the ( u n , u i ) arcs are β s t r o n g arcs. Therefore, the fuzzy cut node x should lie on the fuzzy cycle C n 1 . A node on a fuzzy cycle is a fuzzy cut node if and only if the node is a common node of two fuzzy bridges. An arc of a fuzzy cycle is a fuzzy bridge if and only if the arc is α s t r o n g [30].
In this case, the arcs ( u , x ) and ( x , v ) which are incident to the node x on fuzzy cycle C n 1 are α s t r o n g arcs. If the x node is removed from the graph, then
C O N N G S ( u , v ) = d ( μ ) < C O N N G ( u , v ) .
Since s ( S ) = d ( μ ) and m f ( G S ) = d ( μ ) , the fuzzy node integrity is
I f ( W n ) = min { s ( S ) + m f ( G S ) } = 2 d ( μ )
Case ii. Let fuzzy wheel graph W n not contain a fuzzy cut node. For any arc ( u , v ) of the wheel W n that is not strong, each path between these nodes u and v is a strong path since every path has the same strength between u and v. Therefore, the number of internally disjoint strongest paths between u and v is at most three. Hence, the cardinality of the minimal u v strength reducing set is at most three according to Menger’s theorem [36]. Thus, | S | = | S G ( u , v ) | = 3 . Since S ( u i ) = d ( μ ) for all i = 1 , , n , we obtain s ( S ) = 3 d ( μ ) . In this case, C O N N G S ( u , v ) = 0 since W n is disconnected after removing three nodes. Thus, m f ( G S ) = 0 and the fuzzy node integrity is
I f ( W n ) = min { s ( S ) + m f ( G S ) } = 3 d ( μ )
The proof is completed by (11) and (12). □
Theorem 2.
Let W n be a fuzzy wheel graph where the node u n is a fuzzy hub and the nodes u 1 , u 2 , . . . , u n 1 are on the fuzzy cycle C n 1 . Assume that μ ( u n , u i ) μ ( e ) , where all μ ( e ) values, the membership values of the arcs lying on the cycle, are not equal for e E ( C n 1 ) . Moreover, for i = 1 , , n 1 , all μ ( u n , u i ) are constant. Then, the fuzzy node integrity is
I f ( W n ) = h ( μ ) + q m 1 .
Proof. 
Case i. Let μ ( u n , u i ) > μ ( e ) for e E ( C n 1 ) and i = 1 , , n 1 , and let μ ( u n , u i ) be constant. The nodes u i for i = 1 , , n 1 lying on the cycle are incident to at most one of the strongest arcs on the fuzzy wheel graph W n . Thus, each node u i is a fuzzy end node. Since a node should be incident to at least two strong arcs to be a fuzzy cut node, the nodes u i are not fuzzy cut nodes [34]. However, the node u n is a cut node since u n is adjacent to all the nodes u i and μ ( u n , u i ) > μ ( e ) . Hence, s ( u i ) = h ( μ ) = q m for i = 1 , , n . Let S be a fuzzy cut set of W n . If | S | = 1 , then s ( S ) = | S | . h ( μ ) where S = { u n } . For ( x , y ) E ( C n 1 ) ,   μ ( x , y ) = max { μ ( e ) : e E ( C n 1 ) } = q m 1 . Hence,
C O N N G S ( x , y ) = μ ( x , y ) = q m 1 < C O N N G ( x , y ) = h ( μ ) = q m
Therefore, m f ( G S ) = q m 1 and
I f ( W n ) = min { s ( S ) + m f ( G S ) } = q m + q m 1
If | S | 2 , then s ( S ) 2 h ( μ ) 2 q m and m f ( G S ) 0 . Thus,
I f ( W n ) = min { s ( S ) + m f ( G S ) } 2 q m
Via (15) and (16), the fuzzy node integrity is
I f ( W n ) = min { s ( S ) + m f ( G S ) } = q m + q m 1
Case ii. Let μ ( u n , u i ) be constant for i = 1 , , n 1 and μ ( u n , u i ) μ ( e ) for e E ( C n 1 ) , where at least one of the arcs on the fuzzy cycle has the same membership value with μ ( u n , u i ) . All u u n v paths of length two where u n is the fuzzy hub and u , v V ( C n 1 ) are the strongest paths. Thus, all ( u n , u i ) arcs are strong for i = 1 , , n 1 . The e arcs on the cycle for e E ( C n 1 ) are strong if μ ( u n , u i ) = μ ( e ) ; otherwise, they would be δ -arcs. In this case, the node u n is the only fuzzy cut node of W n since μ ( e ) is different for each e E ( C n 1 ) by the assumption and s ( u i ) = h ( μ ) for i = 1 , , n since u n is adjacent to all u i . Let S be a fuzzy cut set of W n . If | S | = 1 , then s ( S ) = h ( μ ) where S = { u n } for ( x , y ) E ( C n 1 ) . μ ( x , y ) = max { μ ( e ) : e E ( C n 1 ) } = q m 1 . Thus,
C O N N G S ( x , y ) = μ ( x , y ) = q m 1 < C O N N G ( x , y ) = h ( μ ) = q m
Therefore, m f ( G S ) = μ ( x , y ) = q m 1 and
I f ( W n ) = min { s ( S ) + m f ( G S ) } = q m + q m 1
The proof is completed by Case i and Case ii. □
Theorem 3.
Let W n be a fuzzy wheel graph where u n is a fuzzy hub and the nodes u 1 , u 2 , , u n 1 are on the fuzzy cycle C n 1 . If μ ( u n , u i ) values are constant for i = 1 , , n 1 and μ ( u n , u i ) < μ ( e ) for e E ( C n 1 ) , then the fuzzy node integrity is
I f ( W n ) = min { d ( μ ) + q 2 , 3 d ( μ ) } .
Proof. 
Let W n be a fuzzy wheel graph and let μ ( u n , u i ) values be constant for i = 1 , , n 1 and for all e E ( C n 1 ) , μ ( u n , u i ) < μ ( e ) . In this case, all the paths on the wheel W n are strong paths. Since a strong path only contains α s t r o n g or β s t r o n g arcs, W n does not contain any δ arc. Since u n is adjacent to all the nodes u i and μ ( u n , u i ) < μ ( e ) for i = 1 , , n 1 and e E ( C n 1 ) , all the arcs ( u n , u i ) are β s t r o n g arcs and μ ( u n , u i ) = d ( μ ) . Therefore, fuzzy hub u n is not a fuzzy cut node. Thus, s ( u i ) = d ( μ ) for i = 1 , , n and s ( S ) = | S | d ( μ ) , where S is a fuzzy node cut of W n .
There are two cases according to the existence of a fuzzy cut node of W n .
Case i. Let W n have a fuzzy cut node, e.g., x. Thus, x is a fuzzy cut node if and only if x is a common vertex of two fuzzy bridges. Moreover, an arc is a fuzzy bridge if and only if the arc is α s t r o n g . For this reason, x is incident to the α s t r o n g arcs ( y , x ) and ( x , z ) , where y , z σ * .
If | S | = 1 where S = { x } , then s ( S ) = d ( μ ) = q 1 . Hence,
C O N N G S ( y , z ) = q 2 < C O N N G ( y , z ) = q i
for i = 3 , , m and m f ( G S ) = q 2 . Thus, the fuzzy node integrity is
I f ( W n ) = min { s ( S ) + m f ( G S ) } = d ( μ ) + q 2
If | S | = 2 , then s ( S ) = | S | d ( μ ) = 2 d ( μ ) . Let S = { u 1 , u 3 } where u i V ( C n 1 ) for i = 1 , , n 1 . Then,
C O N N G S ( u 2 , u 4 ) = d ( μ ) < C O N N G ( u 2 , u 4 ) = q i
for i = 2 , , m . Hence, m f ( G S ) = d ( μ ) and the fuzzy node integrity is
I f ( W n ) = min { s ( S ) + m f ( G S ) } = 3 d ( μ )
If | S | 3 , then s ( S ) = | S | d ( μ ) 3 d ( μ ) . In this case, m f ( G S ) 0 and the fuzzy node integrity is
I f ( W n ) = min { s ( S ) + m f ( G S ) } 3 d ( μ )
By (22), (24) and (25),
I f ( W n ) = min { d ( μ ) + q 2 , 3 d ( μ ) }
Case ii. Let W n not contain a fuzzy cut node. Therefore, | S | 2 . Let S = { u , v } where u , v σ * and ( u , v ) E ( W n ) . Thus, s ( S ) = | S | d ( μ ) = 2 d ( μ ) and m f ( G S ) = d ( μ ) . By definition,
I f ( W n ) = min { s ( S ) + m f ( G S ) } = 3 d ( μ )
If | S | 3 , then s ( S ) = | S | d ( μ ) 3 d ( μ ) and m f ( G S ) 0 . Hence,
I f ( W n ) = min { s ( S ) + m f ( G S ) } 3 d ( μ )
Via (27) and (28), we obtain
I f ( W n ) = min { s ( S ) + m f ( G S ) } = 3 d ( μ )
Thus, via (26) and (29), we obtain the result. □
Lemma 1.
Let G = ( V , σ , μ ) be a fuzzy cycle graph without a fuzzy cut node. Then,
m f ( G S ) = 0 .
Proof. 
Let S be a fuzzy node cut of a fuzzy cycle G. Since there is no fuzzy cut node, | S | 2 .
Case i. If the remaining graph contains only one component, then S should contain n 1 nodes to be a fuzzy node cut. Thus, there is only one remaining node and m f ( G S ) = 0 .
Case ii. If the remaining graph has two or more components, then m f ( G S ) = 0 since C O N N G S ( u , v ) = 0 or C O N N G S ( u , v ) = C O N N G ( u , v ) for all u , v σ * S . Therefore, m f ( G S ) = 0 .
The proof is completed via Case i and Case ii. □
Theorem 4.
Let G = ( V , σ , μ ) be a locamin fuzzy cycle. Then, the fuzzy node integrity is
I f ( G ) = 2 d ( μ )
Proof. 
Let S be a fuzzy cut set. | S | 2 since G has no fuzzy cut node. Therefore, s ( S ) 2 d ( μ ) where s ( u i ) = d ( μ ) for i = 1 , , n . Moreover, via Lemma 1, m f ( G S ) = 0 . Hence, the value of the of fuzzy node integrity is
I f ( G ) = min { s ( S ) + m f ( G S ) } = 2 d ( μ )
 □
Theorem 5.
Let G = ( V , σ , μ ) be a fuzzy cycle graph with only one α s t r o n g arc. Then, the fuzzy node integrity is
I f ( G ) = 2 d ( μ )
Proof. 
If G has only one α s t r o n g arc, then G is a locamin cycle. Thus, via Theorem 4, the following result is obtained:
I f ( G ) = 2 d ( μ ) .
 □
Theorem 6.
Let G = ( V , σ , μ ) be a self-centered fuzzy cycle graph with n nodes, and let the arcs be represented by e i = ( u i , u i + 1 ) for i = 1 , , n 1 and e n = ( u n , u 1 ) . If 0 < t < s 1
Case i.  I f ( G ) = 2 d ( μ ) if one of the following holds;
(1)   μ ( e i ) = t for i = 1 , , n ;
(2)  μ ( e 2 i 1 ) = t and μ ( e 2 i ) = s for even integer n and i = 1 , 2 , , n 2 ;
(3)  μ ( e 2 i 1 ) = μ ( e n ) = t and μ ( e 2 i ) = s for n = 4 k + 1 where k = 1 , 2 , and i = 1 , 2 , , n 1 2 .
Case ii.  If μ ( e 2 i 1 ) = μ ( e n ) = s and μ ( e 2 i ) = t for n = 4 k 1 where k = 1 , 2 , 3 , . . . and i = 1 , 2 , , n 1 2 , then
I f ( G ) = min { h ( μ ) + d ( μ ) , 2 d ( μ ) } .
Proof. 
Case i. If G is a self-centered fuzzy cycle graph satisfying one of the conditions ( 1 3 ) , G is a multimin cycle since it has more than one weak arc [34]. G is also a locamin cycle since every node is incident to a weak arc. A multimin cycle is a locamin cycle if and only if it has no fuzzy cut nodes [34]. Thus, G does not have a fuzzy cut node. Then, by Lemma 1, m f ( G S ) = 0 . Since G is a locamin fuzzy cycle, we obtain the following via Theorem 4:
I f ( G ) = 2 d ( μ ) .
Case ii. Let G be a self-centered fuzzy cycle with μ ( e 2 i 1 ) = μ ( e n ) = s and μ ( e 2 i ) = t where n = 4 k 1 ,   k = 1 , 2 , 3 , and i = 1 , 2 , , n 1 2 . Then, G is a multimin cycle since it has more than one weak arc. The node u 1 is the only cut node because it is incident to two α s t r o n g arcs where μ ( e 1 ) = μ ( e n ) = h ( μ ) . Thus, s ( u 1 ) = h ( μ ) and s ( u i ) = d ( μ ) for i = 2 , 3 , , n . Let S be a fuzzy cut set of G. If | S | = 1 , then s ( S ) = h ( μ ) where S = { u 1 } . Therefore,
C O N N G S ( u 2 , u n ) = d ( μ ) < C O N N G ( u 2 , u n ) = h ( μ )
and m f ( G S ) = d ( μ ) . Thus, by definition,
I f ( G ) = min { s ( S ) + m f ( G S ) } = h ( μ ) + d ( μ )
If | S | 2 , then m f ( G S ) = 0 . Because u , v σ * S , we obtain C O N N G S ( u , v ) = 0 or C O N N G S ( u , v ) = C O N N G ( u , v ) for u 1 S ,   s ( S ) h ( μ ) + ( | S | 1 ) d ( μ ) h ( μ ) + d ( μ ) . Hence,
I f ( G ) = min { s ( S ) + m f ( G S ) } h ( μ ) + d ( μ ) .
The equality holds for | S | = 2 . Thus,
I f ( G ) = min { s ( S ) + m f ( G S ) } = h ( μ ) + d ( μ )
For u 1 S ,   s ( S ) | S | d ( μ ) 2 d ( μ ) . Hence,
I f ( G ) = min { s ( S ) + m f ( G S ) } 2 d ( μ ) .
By the definition of fuzzy node integrity, the minimum value is satisfied when | S | = 2 . Therefore,
I f ( G ) = min { s ( S ) + m f ( G S ) } = 2 d ( μ ) + 0 = 2 d ( μ )
By (38),(40) and (42), we obtain
I f ( G ) = min { h ( μ ) + d ( μ ) , 2 d ( μ ) } .
 □
Theorem 7.
Let G = ( V , σ , μ ) be a regular fuzzy cycle graph. Then, the fuzzy node integrity value
I f ( G ) = 2 d ( μ )
Proof. 
If G is a regular fuzzy cycle, then either the membership values μ ( e i ) of the arcs e i E ( G ) are equal or the membership values of the alternate arcs are equal [37]. Thus, there are two cases for the proof.
Case i. If the membership values of all arcs are equal, then all the arcs are weakest arcs. For this reason, all nodes are central nodes. Thus, G is a self-centered fuzzy cycle [38]. By Theorem 6, we obtain
I f ( G ) = 2 d ( μ )
Case ii. If the membership values of the alternate arcs are equal, then G has an even number of nodes [37]. Thus, G is a self-centered fuzzy cycle, and by Theorem 6
I f ( G ) = 2 d ( μ ) .
 □
Theorem 8.
Consider a fuzzy graph G = ( V , σ , μ ) with a single weakest arc and a cycle graph G * . Then, the fuzzy node integrity value is
I f ( G ) = q 2 + d ( μ ) .
Proof. 
Let ( u 1 , u 2 ) be the weakest arc of the cycle. It can thus be concluded that the nodes u 1 and u 2 are fuzzy end nodes, while the nodes labeled u i for i = 3 , , n are fuzzy cut nodes [33]. Hence, ( u 1 , u 2 ) is δ -arc and μ ( u 1 , u 2 ) = d ( μ ) = q 1 . The other arcs are α -strong. Hence, s ( u i ) = q j for i = 1 , , n , j = 2 , , m . Assume that S is a fuzzy cut set and that there are two cases according to the cardinality of S.
Case i. Let | S | = 1 . Then, S = { u i } where i = 3 , , n and s ( S ) = min { q j j = 2 , , m } = q 2 . For any x , y σ * ,
C O N N G S ( x , y ) = d ( μ ) < C O N N G ( x , y ) = q j
for j = 2 , , m Hence, m f ( G S ) = d ( μ ) = q 1 and
I f ( G ) = min { s ( S ) + m f ( G S ) } = q 2 + d ( μ ) = q 2 + q 1
Case ii. Let | S | 2 . Then, s ( S ) q 2 + q 3 and m f ( G S ) 0 . Thus,
I f ( G ) = min { s ( S ) + m f ( G S ) } q 2 + q 3
Therefore, by taking the minimum of Equations (49) and (50), we obtain the following result:
I f ( G ) = min { s ( S ) + m f ( G S ) } = q 2 + d ( μ ) = q 2 + q 1 .
 □
Theorem 9.
Let G = ( V , σ , μ ) be a fuzzy star graph. Then, the fuzzy node integrity value is
I f ( G ) = d ( μ ) .
Proof. 
Let u 1 , u 2 , , u n + 1 be the nodes of a fuzzy star, where u n + 1 is connected to all other nodes. Then, all arcs ( u i , u n + 1 ) E ( G ) are α s t r o n g arcs. For i = 1 , , n , the node u n + 1 is a fuzzy cut node. Assume that S is a fuzzy cut set of G.
Case i. If | S | = 1 , then S = { u n + 1 } and s ( S ) = d ( μ ) = q 1 . Hence,
C O N N G S ( u i , u j ) = 0 ; i , j = 1 , , n ; i j and m f ( G S ) = 0 . Thus, by the definition
I f ( G ) = min { s ( S ) + m f ( G S ) } = d ( μ ) = q 1
Case ii. If | S | 2 , then S = { u 1 , u 2 , , u n } for u n + 1 S . Therefore,
s ( S ) = i = 1 n s ( u i ) = j = 1 m q j . Since G S contains only the node u n + 1 ,
m f ( G S ) = 0 . Thus,
I f ( G ) = min { s ( S ) + m f ( G S ) } = j = 1 m q j + 0 = j = 1 m q j
If u n + 1 S , then s ( S ) q 1 + q 2 and m f ( G S ) = 0 since for any x , y σ *
C O N N G S ( x , y ) = 0 < C O N N G ( x , y ) = q j
Hence, by definition,
I f ( G ) = min { s ( S ) + m f ( G S ) } q 1 + q 2
Via (53), (54) and (56), we obtain the following result:
I f ( G ) = d ( μ ) = q 1 .
 □

4. Real-World Case Study: Military Logistics

In military logistics, identifying critical nodes and optimizing routes are crucial for ensuring the smooth movement of supplies and troops, even under uncertain conditions. This section utilizes the aforementioned fuzzy node integrity parameter to enhance network resilience and strategic movement planning.

4.1. Problem Definition

Military logistics is not solely concerned with finding the shortest or fastest route but rather with identifying the most suitable route between predefined nodes in a battle environment. This involves determining the optimal path based on factors beyond distance and duration, such as slope gradients, route traversability, water barriers, and vegetative obstacles.
Lytvynenko and Lytvynenko addressed the problem of determining the most comfortable routes for military unit movements between two points using fuzzy graph models in [39]. In their study, they utilized data on slope steepness, water and vegetative barriers, and other terrain features obtained through GIS analysis to define membership values for routes [39]. The fuzzy graph they obtained is illustrated in Figure 3 [39]. In this graph, as the membership values of the arcs decrease, the difficulty of crossing the roads increases.
One such scenario analyzed in this study involves identifying the most comfortable route between nodes v 1 and v 8 for troop movement, as shown in Figure 3. Lytvynenko and Lytvynenko determined the most comfortable route as { v 1 , v 3 , v 2 , v 5 , v 8 } in [39]. However, their proposed solution does not fully consider network resilience against node failures. This study further extends their work by incorporating fuzzy node integrity, which not only verifies the feasibility of existing routes but also assesses network resilience against node failures.

4.2. Application of Fuzzy Node Integrity to Military Logistics

The logistics network is modeled as a fuzzy graph G, given in Figure 3, where nodes represent key military locations, edges represent roads between locations, and membership values indicate road suitability.
The objective of this analysis is to evaluate network susceptibility and identify the critical nodes and roads in the event of disruptions. The proposed strategy consists of the following steps:
  • Finding the adjacency matrix of the fuzzy graph G, which is given in Figure 3.
  • Finding the matrix including strength of connectedness for all possible node pairs.
  • Determining the strong arcs.
  • Finding the strongest weights of all nodes.
  • Determining fuzzy cut nodes.
  • Computing fuzzy node connectivity to identify the network’s weakest nodes and fuzzy node integrity to estimate the impact of node failures.
  • Step 1: The adjacency matrix A [ v i , v j ] represents the membership values of the arcs between the nodes v i and v j given in Table 2.
  • Step 2: The strength of the connectedness matrix C [ v i , v j ] represents the strength of connectedness between the nodes v i and v j , denoted by C O N N G ( v i , v j ) , which is the maximum of the strengths of all paths between these nodes given in Table 2.
  • Step 3: If μ ( v i , v j ) C O N N G ( v i , v j ) ( v i , v j ) , then the arc between the nodes v i and v j is called a strong arc; otherwise, it is a δ -arc. If the off-diagonal entries of the strength of the connectedness matrix are equal to the non-zero off-diagonal entries of the adjacency matrix, then the corresponding arcs are called strong arcs. Checking these matrices gives the set of strong arcs for the fuzzy graph G. L = { ( v 1 , v 3 ) , ( v 1 , v 4 ) , ( v 2 , v 3 ) , ( v 2 , v 5 ) , ( v 4 , v 7 ) , ( v 5 , v 6 ) , ( v 5 , v 8 ) } . To decide if the arcs are α -strong or β -strong, we made a table to check if either μ ( v i , v j ) > C O N N G ( v i , v j ) ( v i , v j ) for α -strong or μ ( v i , v j ) = C O N N G ( v i , v j ) ( v i , v j ) for β -strong.
    According to Table 3, all the arcs in this graph are either α -strong arcs or δ -arcs, as shown in Figure 3.
  • Step 4: The strong weight of a node v is the minimum of the weights of strong arcs incident on v. The strongest weight of each node of G is given in Table 4.
  • Step 5: The nodes v 1 , v 2 , v 3 , v 4 , v 5 are fuzzy cut nodes since each one is a common node of at least two α -strong arcs [30].
  • Step 6: The calculations are summarized in Table 5, which displays key values, such as fuzzy cut nodes; corresponding strong weights; the strength of connectedness C O N N G ( u , v ) and C O N N G S ( u , v ) , where the values decrease for those nodes after removing S; the residual strength of connectedness m f ( G S ) ; and fuzzy node integrity values corresponding to the fuzzy cut nodes.
Other fuzzy node cuts having two or more nodes were not considered since fuzzy node connectivity and fuzzy node integrity are equal to the minimum values.
Fuzzy node connectivity of this graph is κ ( G ) = min { s ( S ) } = 0.7 and fuzzy node integrity is I f ( G ) = min { s ( S ) + m f ( G S ) } = 1.2 .
The strength of connectedness between v 1 and v 8 is equal to 0.9 , and the strongest path with the strength of connectedness value 0.9 is { v 1 , v 3 , v 2 , v 5 , v 8 } , which is the same route as Lytvynenko and Lytvynenko found in their study [39].
In the event of any disruptions in the transport hubs during the transportation of vehicles and ammunition through routes, there may be a requirement to change the route or secure the concerned roads. Critical node identification is extremely necessary in order to counter the expected problem. Vulnerability parameters can be applied in the critical node identification. Applying the fuzzy node connectivity parameter to the graph yields κ ( G ) = 0.7 , which aids in effectively identifying a different route. Specifically, v 4 is the cluster element that provides this value. This suggests that v 4 is a crucial node, and any malfunction in this node causes trouble when an army is transitioning from one point to another.
If a failure at node v 4 does occur, it is critical for alternative pathways to be identified. Therefore, when choosing a route, either this node should be excluded in the route or some necessary precautions should be assessed. The fuzzy node integrity parameter proposed in this paper provides a valuable tool for analyzing these issues. In that situation, graph analysis will give I f ( G ) = s ( S ) + m f ( G S ) = 1.2 , meaning that a failure at node v 4 will equate to a diversion in the route with passability being lowered to 0.5. Since this measure is influenced by the arc between nodes v 5 and v 7 , a revalidation of road conditions is necessary. The combination of the two criteria indicates that the alternative route should try to avoid the v 4 node. If this is not feasible, either the road between the v 5 and v 7 nodes should be improved or the shipment should be modified to fit the requirements of the route.
If another fuzzy cut node would be chosen to be checked as a critical point, fuzzy node connectivity could not be utilized since four of the fuzzy cut nodes have the same strong weight. However, if fuzzy node integrity is used by performing a check, the minimum values of integrity state that the second critical node is v 3 and that it has a corresponding integrity value of 1.6 . A failure at node v 3 will cause the route to be rerouted, with passability being reduced to 0.7 . As this measure is influenced by the arc between nodes v 4 and v 5 , a revalidation of road conditions is necessary. During the transport of vehicles and military equipment along routes, it may be necessary to change the route or secure specific roads in the case of disruptions at transfer centers.

4.3. Comparative Analysis

In order to better validate the performance of the introduced fuzzy node integrity, we are comparing it with existing network vulnerability parameters. The key performance distinctions in fuzzy node integrity in relation to fuzzy node connectivity [26] and integrity for fuzzy graphs [24] are discussed in this section.
The comparative analysis is based upon the following aspects:
  • Failure Impact: The measure in which a method incorporates node failures and how they impact network connectivity.
  • Adaptability to Uncertainty: Whether or not the measure uses fuzzy or probabilistic aspects to deal with uncertainty.
  • Resilience Estimation: The ability of the method to quantify remaining connectivity following disturbances.
  • Alternative Path Planning: If the method provides alternative route suggestions in cases of failures.
Table 6 summarizes how different methods compare based on these criteria.
This comparison highlights that fuzzy node integrity provides a more adaptive and realistic vulnerability measure than integrity and fuzzy node connectivity methods by incorporating partial degradation and a residual network strength assessment.
The fuzzy node connectivity parameter provides information about which node is critical, while the fuzzy node integrity parameter provides information not only about the critical node but also about which arcs need to be strengthened.
The concept of integrity for fuzzy graphs defined by Saravanan et al. in [24] only depends on the disconnection and the membership values of nodes. Therefore, this parameter cannot be evaluated for this type of fuzzy graph, which is given in Figure 3. It is not possible to accurately study the fuzziness of the situation as their definition relies on the disconnection. Consequently, their research motivated us to redefine the integrity parameter for fuzzy graphs.

5. Results and Discussion

The concept of ‘fuzzy node integrity’ was applied in a military logistics case study to measure its real-world efficacy. The implications and findings of this case study are presented in this section.

5.1. Key Insights from the Case Study

  • Identification of Critical Nodes: The strategy was able to determine nodes whose removal would result in a substantial loss in the resilience of the network. This was especially true when taking into account the network’s nodes of passage, which are the nodes with the least strong weight but the highest difficulty.
  • Scenario-based Analysis: The following two main failure scenarios were analyzed:
    Targeted Node Failures: The removal of nodes with least strong weight affected the strength of connectedness by reducing the overall efficiency of the logistics network. The outcome showed a drop in network connectivity when critical nodes were targeted.
    Random Node Failures: The network could tolerate some node failures with the backup routes still being effective. The capability of the system to reroute logistics was still maintained with node failures.
  • Quantitative Performance Comparison:
    Integrity for fuzzy graph is useless for this problem. It cannot be evaluated in these kinds of graphs since the definition depends only on the disconnection and the membership values of nodes.
    Fuzzy node connectivity shows enhanced flexibility compared to traditional approaches while still being short of full resilience.
    Fuzzy node integrity proves its high resilience estimation performance by providing information not only about the critical node but also about which arcs need to be strengthened.
  • Real-Time Flexibility: The study showed how, by recalculating fuzzy node integrity in real time, logistical operations can be reallocated dynamically to optimize routes in line with fluctuating conditions, such as unexpected disruptions or road obstructions.

5.2. Practical Implications

The findings of this study have practical implications for real-world applications, such as the following:
  • Transport Networks: Enhancing the resilience of road and rail networks against disruptions.
  • Cybersecurity: Applying fuzzy node integrity to assess network vulnerability in critical communication infrastructures.
  • Disaster Management: Planning for emergency responses in dynamic environments.
  • Supply Chain Optimization: Identifying vulnerabilities in supply chains to ensure efficient distribution of products.

5.3. Limitations and Future Work

Even though the proposed method is a notable improvement in network vulnerability estimation, certain limitations exist, such as the following:
  • Static Network Assumption: We have assumed a static network in this model, but real-world military logistics networks are highly dynamic in nature. Future research studies should incorporate real-time adaptability in line with time-dependent fuzzy graphs.
  • Computational Complexity: The calculation for fuzzy node integrity is becoming complex as network sizes expand. Future studies should concentrate on creating efficient techniques for dealing with real-time large-scale networks.
  • Limited Real-World Evaluation: The method is established in a theoretical case study but is in need of empirical testing in real logistics networks in order to validate its effectiveness.
  • Interdependency Considerations: Interdependent networks are normally engaged in logistics in armed conflicts, such as supply networks and communications networks. The application may be extended to cover multi-layer fuzzy networks.
Future research can be directed towards merging machine learning mechanisms for adapting path selection in real-time conditions in fuzzy networks. Predictive modeling based on past network outages can be utilized for network vulnerability estimation improvement. A computational structure for efficient solutions for large-scale problems and applications in multiple-layered fuzzy networks will continue to have increased real-world applications in dynamic networks.
One promising direction for further research is the extension of the fuzzy node integrity framework to neutrosophic graphs, which would contribute to even more effective vehicles for quantifying network susceptibility by incorporating a more complete representation of indeterminacy and uncertainty in complex networks.

6. Conclusions

This paper addresses an important challenge in network vulnerability studies and introduces the fuzzy node integrity parameter, a metric specifically devised for fuzzy graphs. Contrary to other integrity metrics, this parameter considers the strength of connectedness; hence, it offers a subtler and more realistic appraisal of the robustness of a network in uncertain environments. Therefore, with this contribution, new definitions were openly extended, and an important gap in the fuzzy graph theory was covered by an integrated framework covering both theoretical improvements and practical applications.
The theoretical contributions of this work are related to the derivation of general formulas for fuzzy graph structures, such as cycle graphs, wheel graphs, and star graphs, which can serve as basic tools for future research studies in the stated field. The applicability of the proposed parameter is assured by its practical relevance in a case study related to military logistics, to which it was applied with a view to finding out the most critical nodes and route optimization in uncertain conditions. This example illustrates the potential of the parameter for modeling real-world problems such as disrupted supply chains and vulnerabilities in infrastructures.
Despite these contributions, there are still some limitations, and there are avenues for future research. One limitation is the stationarity assumed in current modeling when real logistics networks are highly dynamic in nature. Real-time adaptive, time-varying fuzzy graph-based algorithms must be incorporated in future research to better capture this dynamism. Also, as the network size is increased, computational complexity in fuzzy node integrity calculations is increased as well, and efficient algorithms for larger networks must be derived. A second major area is empirical validation; although we carried out a test on a hypothetical case study in this paper, real-world validation is needed for measuring practical performance in different application domains. Also, in typical military logistics, there are multiple-layer networks like supply chains, transportation networks, and communications networks. The model could be extended to account for interdependencies across them, and this could greatly enhance its applicability and resilience.
Fuzzy node integrity methodology, as a network vulnerability testing tool, can be extended to incorporate advanced path optimization techniques and predictive analyses for predicting network vulnerabilities in complex networks. The method can be applied for enhancing network resilience in unpredictable and dynamic environments.

Author Contributions

Conceptualization, G.B.-T.; formal analysis, F.N.M. and G.B.-T.; methodology, F.N.M. and G.B.-T.; resources, F.N.M.; software, F.N.M.; supervision, G.B.-T.; validation, F.N.M. and G.B.-T.; writing—original draft preparation, F.N.M.; writing—review and editing, G.B.-T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study.

Acknowledgments

This study was part of F.N. Murater’s Ph.D. thesis, which was approved at Manisa Celal Bayar University, Turkey, in 2021.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Harary, F. Graph Theory; Addison-Wesley Publishing Company Inc.: Reading, MA, USA, 1969. [Google Scholar]
  2. Barefoot, C.A.; Entringer, H.R.; Swart, H. Vulnerability in graphs—a comparative survey. J. Comb. Math. Comb. Comput. 1987, 1, 13–22. [Google Scholar]
  3. Cozzens, M.B.; Moazzami, D.; Stueckle, S. The tenacity of a graph. In Graph Theory, Combinatorics, and Algorithms; Alavi, Y., Allen, S., Eds.; Wiley: New York, NY, USA, 1995; pp. 1111–1112. [Google Scholar]
  4. Chvátal, V. Tough graphs and Hamiltonian circuits. Discret. Math. 1973, 5, 215–228. [Google Scholar] [CrossRef]
  5. Li, Y.; Zhang, S.; Li, X. Rupture degree of a graph. Int. J. Comput. Math. 2005, 82, 793–803. [Google Scholar] [CrossRef]
  6. Rosenfeld, A. Fuzzy graphs. In Fuzzy Sets and Their Applications to Cognitive and Decision Processes; Academic Press: Washington, DC, USA, 1975; pp. 77–95. [Google Scholar]
  7. Yeh, R.T.; Bang, S.Y. Fuzzy relations, fuzzy graphs and their applications to clustering analysis. In Fuzzy Sets and Their Applications to Cognitive and Decision Processes; Academic Press: Washington, DC, USA, 1975; pp. 25–149. [Google Scholar]
  8. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  9. Al-Shamiri, M.M.A.; Ahmad, U.; Maryam, A.; Akram, M. Cubic directed graphs with application. J. Appl. Math. Comput. 2024, 70, 2169–2196. [Google Scholar] [CrossRef]
  10. Ahmad, U.; Batool, T. Domination in rough fuzzy digraphs with application. Soft Comput. 2023, 27, 2425–2442. [Google Scholar] [CrossRef]
  11. Muhammad, A.; Shareef, A.; Al-Kenani, A.N. Pythagorean fuzzy incidence graphs with application in one-way toll road network. Granul. Comput. 2024, 9, 39. [Google Scholar]
  12. Islam, S.R.; Pal, M. Hyper-Wiener index for fuzzy graph and its application in share market. J. Intell. Fuzzy Syst. 2021, 41, 2073–2083. [Google Scholar] [CrossRef]
  13. Islam, S.R.; Pal, M. Second Zagreb index for fuzzy graphs and its application in mathematical chemistry. Iran. J. Fuzzy Syst. 2023, 20, 119–136. [Google Scholar]
  14. Islam, S.R.; Pal, M. Hyper-connectivity index for fuzzy graph with application. Twms J. Appl. Eng. Math. 2023, 13, 920–936. [Google Scholar]
  15. Islam, S.R.; Pal, M. Multiplicative version of first Zagreb index in fuzzy graph and its application in crime analysis. Proc. Natl. Acad. Sci. India Sect. A Phys. Sci. 2024, 94, 127–141. [Google Scholar]
  16. Islam, S.R.; Pal, M. An investigation of edge F-index on fuzzy graphs and application in molecular chemistry. Complex Intell. Syst. 2023, 9, 2043–2063. [Google Scholar]
  17. Wang, H.; Yu, X.; Lu, Y. A reinforcement learning-based ranking teaching-learning-based optimization algorithm for parameters estimation of photovoltaic models. Swarm Evol. Comput. 2025, 93, 101844. [Google Scholar]
  18. Sujithra, P.; Mathew, S.; Mordeson, J.N. Advanced fuzzy connectivity metrics for enhancing security in dynamic network environments. Inf. Sci. 2025, 700, 121857. [Google Scholar]
  19. Dhanya, C.M.; Mathew, S.; Mordeson, J.N. Connectivity in Cartesian products of fuzzy graphs: Application to decision making. J. Appl. Math. Comput. 2025. [Google Scholar] [CrossRef]
  20. Prabhath, A.; Mathew, S.; Mordeson, J.N. Generalized cycle connectivity in fuzzy graphs. Fuzzy Sets Syst. 2024, 482, 108909. [Google Scholar]
  21. Ma, J.; Li, Q.; Zhou, X. Fuzzy edge connectivity and fuzzy local edge connectivity with applications to communication networks. Fuzzy Sets Syst. 2021, 410, 109–125. [Google Scholar]
  22. Ma, J.; Li, L.; Li, J. Fuzzy average edge connectivity with its application to communication networks. Soft Comput. 2023, 27, 1367–1378. [Google Scholar]
  23. Ganesan, B.; Raman, S.; Pal, M. Strong domination integrity in graphs and fuzzy graphs. J. Intell. Fuzzy Syst. 2022, 43, 2619–2632. [Google Scholar]
  24. Saravanan, M.; Sujatha, R.; Sundareswaran, R. A study on regular fuzzy graphs and integrity of fuzzy graphs. Int. J. Appl. Eng. Res. 2015, 10, 160–164. [Google Scholar]
  25. Saravanan, M.; Sujatha, R.; Sundareswaran, R. Integrity of fuzzy graphs. Bull. Int. Math. Virtual Inst. 2016, 6, 89–96. [Google Scholar]
  26. Mathew, S.; Sunitha, M.S. Node connectivity and arc connectivity in fuzzy graphs. Inf. Sci. 2010, 180, 519–531. [Google Scholar]
  27. Binu, M.; Mathew, S.; Mordeson, J.N. Connectivity index of a fuzzy graph and its application to human trafficking. Fuzzy Sets Syst. 2019, 360, 117–136. [Google Scholar]
  28. Murater, F.N.; Bacak Turan, G.; Aslan, E. Bulanık çizgelerde zedelenebilirlik parametreleri: Bulanık tepe kararlılık değeri. J. Inst. Sci. Technol. 2025, 15, 316–329. [Google Scholar]
  29. Murater, F.N.; Bacak-Turan, G. Fuzzy node connectivity of some classes of graphs. J. Mod. Technol. Eng. 2024, 9, 2. [Google Scholar]
  30. Mathew, S.; Sunitha, M.S. Types of arcs in a fuzzy graph. Inf. Sci. 2009, 179, 1760–1768. [Google Scholar]
  31. Mordeson, J.N.; Nair, P.S. Fuzzy Graphs and Fuzzy Hypergraphs; Physica-Verlag: Heidelberg, Germany, 2000. [Google Scholar]
  32. Bhutani, K.R.; Rosenfeld, A. Strong arcs in fuzzy graphs. Inf. Sci. 2003, 152, 319–323. [Google Scholar]
  33. Bhutani, K.R.; Mordeson, J.N.; Rosenfeld, A. On degrees of end nodes and cut nodes in fuzzy graphs. Iran. J. Fuzzy Syst. 2004, 1, 57–64. [Google Scholar]
  34. Bhutani, K.R.; Rosenfeld, A. Fuzzy end nodes in fuzzy graphs. Inf. Sci. 2003, 152, 323–326. [Google Scholar]
  35. Altundag, F.N. Vulnerability Parameters of Fuzzy Graphs. PhD Thesis, Manisa Celal Bayar University, Manisa, Turkey, 2021. [Google Scholar]
  36. Mathew, S.; Sunitha, M.S. Menger’s theorem for fuzzy graphs. Inf. Sci. 2013, 222, 717–726. [Google Scholar]
  37. Gani, A.N.; Radha, K. On regular fuzzy graphs. J. Phys. Sci. 2008, 12, 33–40. [Google Scholar]
  38. Tom, M.; Sunitha, M.S. Strong sum distance in fuzzy graphs. SpringerPlus 2015, 4, 214. [Google Scholar] [PubMed]
  39. Lytvynenko, V.; Lytvynenko, O. Application of fuzzy graph models for finding rational routes. Adv. Mil. Technol. 2016, 10, 21–29. [Google Scholar]
Figure 1. A fuzzy graph with fuzzy node integrity value I f ( G ) = 0.5 .
Figure 1. A fuzzy graph with fuzzy node integrity value I f ( G ) = 0.5 .
Symmetry 17 00474 g001
Figure 2. A fuzzy wheel graph G.
Figure 2. A fuzzy wheel graph G.
Symmetry 17 00474 g002
Figure 3. The fuzzy graph G obtained in [39].
Figure 3. The fuzzy graph G obtained in [39].
Symmetry 17 00474 g003
Table 1. Summary of calculations for fuzzy node integrity of the graph in Figure 1.
Table 1. Summary of calculations for fuzzy node integrity of the graph in Figure 1.
S u v CONN G S ( u , v ) CONN G ( u , v ) m f ( G S ) s ( S ) s ( S ) + m f ( G S )
{ u 1 } u 2 u 3 0.30.30.3
{ u 1 } u 2 u 4 0.20.30.20.30.5
{ u 1 } u 3 u 4 0.20.40.20.30.5
{ u 1 , u 2 } u 3 u 4 0.20.40.20.60.8
{ u 1 , u 3 } u 2 u 4 00.300.60.6
{ u 2 , u 3 } u 1 u 4 0.50.50.60.6
{ u 1 , u 2 , u 3 } u 4 00.90.9
{ u 1 , u 2 , u 4 } u 3 01.11.1
{ u 2 , u 3 , u 4 } u 1 01.11.1
Table 2. Adjacency matrix A and strength of connectedness matrix C.
Table 2. Adjacency matrix A and strength of connectedness matrix C.
A v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8
v 1 00.51.00.90.00.00.00.0
v 2 0.500.90.00.90.80.00.0
v 3 1.00.900.70.80.00.00.0
v 4 0.90.00.700.70.00.70.0
v 5 0.00.90.80.701.00.51.0
v 6 0.00.80.00.01.000.00.5
v 7 0.00.00.00.70.50.000.5
v 8 0.00.00.00.01.00.50.50
C v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8
v 1 00.91.00.90.90.90.70.9
v 2 0.900.90.90.90.90.70.9
v 3 1.00.900.90.90.90.70.9
v 4 0.90.90.900.90.90.70.9
v 5 0.90.90.90.901.00.71.0
v 6 0.90.90.90.91.000.71.0
v 7 0.70.70.70.70.70.700.7
v 8 0.90.90.90.91.01.00.70
Table 3. Strong arcs of the fuzzy graph G.
Table 3. Strong arcs of the fuzzy graph G.
u v CONN G ( u , v ) CONN G ( u , v ) ( u , v ) Strength
v 1 v 3 10.7 α -strong
v 1 v 4 0.90.7 α -strong
v 2 v 3 0.90.8 α -strong
v 2 v 5 0.90.8 α -strong
v 4 v 7 0.70.5 α -strong
v 5 v 6 10.8 α -strong
v 5 v 8 10.5 α -strong
Table 4. The strongest weight of each node of G.
Table 4. The strongest weight of each node of G.
v v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8
s ( v ) 0.90.90.90.70.910.71
Table 5. Summary of calculations for fuzzy node connectivity and fuzzy node integrity of the fuzzy graph G in Figure 3.
Table 5. Summary of calculations for fuzzy node connectivity and fuzzy node integrity of the fuzzy graph G in Figure 3.
S u v CONN G ( u , v ) CONN G S ( u , v ) m f ( G S ) s ( S ) s ( S ) + m f ( G S )
{ v 1 } v 2 v 4 0.90.70.70.91.6
v 3 v 4 0.90.7
v 4 v 5 0.90.7
v 4 v 6 0.90.7
v 4 v 8 0.90.7
{ v 2 } v 1 v 5 0.90.80.80.91.7
v 1 v 6 0.90.8
v 1 v 8 0.90.8
v 3 v 5 0.90.8
v 3 v 6 0.90.8
v 3 v 8 0.90.8
v 4 v 5 0.90.8
v 4 v 6 0.90.8
v 4 v 8 0.90.8
{ v 3 } v 1 v 2 0.90.70.70.91.6
v 1 v 5 0.90.7
v 1 v 6 0.90.7
v 1 v 8 0.90.7
v 2 v 4 0.90.7
v 4 v 5 0.90.7
v 4 v 6 0.90.7
v 4 v 8 0.90.7
{ v 4 } v 1 v 7 0.70.50.50.71.2
v 2 v 7 0.70.5
v 3 v 7 0.70.5
v 5 v 7 0.70.5
v 6 v 7 0.70.5
v 7 v 8 0.70.5
{ v 5 } v 1 v 6 0.90.80.80.91.7
v 2 v 6 0.90.8
v 3 v 6 0.90.8
v 4 v 6 0.90.8
v 1 v 8 0.90.5
v 2 v 8 0.90.5
v 3 v 8 0.90.5
v 4 v 8 0.90.5
v 6 v 8 1.00.5
v 7 v 8 0.70.5
Table 6. Comparative analysis of network vulnerability parameters.
Table 6. Comparative analysis of network vulnerability parameters.
MethodFailure ImpactUncertainty AdaptationResilience EstimationAlternative Path PlanningNumerical Value
IntegrityBinary DisconnectionNoNoNoNot Suitable for this Graph
Fuzzy Node ConnectivityPartial Failure ConsiderationYesNoLimited0.7
Fuzzy Node Integrity (Proposed)Strength-Based Failure ConsiderationYesYesYes1.2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Murater, F.N.; Bacak-Turan, G. A New Graph Vulnerability Parameter: Fuzzy Node Integrity. Symmetry 2025, 17, 474. https://doi.org/10.3390/sym17040474

AMA Style

Murater FN, Bacak-Turan G. A New Graph Vulnerability Parameter: Fuzzy Node Integrity. Symmetry. 2025; 17(4):474. https://doi.org/10.3390/sym17040474

Chicago/Turabian Style

Murater, Ferhan Nihan, and Goksen Bacak-Turan. 2025. "A New Graph Vulnerability Parameter: Fuzzy Node Integrity" Symmetry 17, no. 4: 474. https://doi.org/10.3390/sym17040474

APA Style

Murater, F. N., & Bacak-Turan, G. (2025). A New Graph Vulnerability Parameter: Fuzzy Node Integrity. Symmetry, 17(4), 474. https://doi.org/10.3390/sym17040474

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop