1. Introduction
Fuzzy graphs are used in real life to model systems with uncertainty and imprecision, such as social networks, transportation, and decision-making under ambiguity. They provide a flexible framework to represent partial relationships and varying degrees of connectivity in complex environments.
A coalition is formed when two or more political parties choose to collaborate temporarily in pursuit of a common goal. This most commonly happens under parliamentary systems when no political party wins a clear majority in a general election. When this occurs, a parliamentary majority supports the formation of a coalition cabinet by two or more parties. Coalition cabinets are common in many nations. We shall exclusively study scenarios in which coalitions consist of two political parties, despite the fact that coalitions usually involve agreements between more than two parties. This implies the following model of graph theory.
Coalitions in crisp graphs have the advantage of simplicity and clear relationships, making them easy to analyze mathematically and suitable for small, well-defined systems. However, they lack flexibility and fail to represent uncertainty or partial relationships, which limits their applicability to real-world scenarios where relationships are dynamic or imprecise. This oversimplification often overlooks the nuanced interactions and dependencies in complex systems. Fuzzy graphs can overcome these limitations by allowing partial memberships and uncertain connections, providing a realistic framework for modeling coalitions. They capture the dynamic and flexible nature of partnerships, making them ideal for uncertain environments like smart cities, decision-making systems, and interconnected infrastructures, where coalition dynamics evolve with changing factors.
Fuzzy graph theory is ideal for modeling coalition concepts, as it effectively captures the uncertainty and imprecision in real-world systems, where relationships are often ambiguous. By incorporating partial memberships, it provides a nuanced representation of coalition partners, enabling dynamic and flexible partnerships that cannot be modeled using crisp graphs. The use of strong arcs and fuzzy coalitions allows for the analysis of cooperative behavior in uncertain environments. Additionally, it integrates quantitative relationships with qualitative uncertainties, enhancing decision-making in complex coalition-formation scenarios.
Ref. [
1] A subset
is defined as a
dominating set of a graph
if every vertex not in
has at least one neighbor within
Ref. [
1] The
open neighborhood of
is
Every vertex
is referred to as a
neighbor of
and
the
of
denoted
Ref. [
2] A
fuzzy graph consists of a finite and non-empty set
where
represents the true membership and
represents the false membership value of
The condition
must hold for all pairs of vertices
Ref. [
3] The
strength of connectedness between two nodes
and
is defined as the maximum of the strength of all paths between
and
and is denoted by
. Ref. [
3] An arc of a fuzzy graph is called
strong if its weight is at least as great as the strength of connectedness of its end nodes when it is deleted. Ref. [
3] Let
be a fuzzy graph. Let
and
be two nodes of
. We say that
strongly dominates if
is a strong arc. Ref. [
3] A subset
of
is considered a
strong domination set if every vertex
is strongly dominated by at least one neighbor in
The strong domination number of
denoted as
is the smallest size of a strong domination set in
Ref. [
1] In a graph
with
vertices, a vertex that has a degree of
is called a
full vertex. Ref. [
1] If
then it is said to be a
singleton set. Ref. [
1] An
induced subgraph is a graph whose vertex set is
and whose edge set consists of all of the edges in
that have both endpoints in
Ref. [
1] A
coalition in a graph
G consists of two disjoint sets of vertices
and
, neither of which is a dominating set but whose union
is a dominating set. We say that the set
and
form a coalition and are coalition partners. Ref. [
1] A
coalition partition, henceforth called a
-partition, in a graph
is a vertex partition
, such that every set
of
is either a singleton dominating set, or is not a dominating set but forms a coalition with another set
in
. The coalition number
equals the maximum order
of a
-partition of
having order
, called a
- partition. Ref. [
4] Let
be a graph with a
- partition
. The
coalition graph of
is the graph with vertex set
, corresponding one-to-one with the sets of
, and the two vertices
and
are adjacent in
if and only if the sets
and
are coalition partners in
; that is, neither
nor
is a dominating set of
, but
is a dominating set of
.
1.1. Literature Review
This paper distinguishes itself by extending coalition theory to fuzzy graph structures, providing a unique framework for modeling cooperative behaviors in uncertain environments such as smart cities, which are not addressed in traditional coalition graph models.
Table 1 highlights the novel focus on fuzzy coalition graphs and their practical applications in security and resource sharing across interconnected infrastructures.
1.2. Motivation
Fuzzy coalition graphs provide a valuable approach to understanding complex networks where the connections between components vary in strength or certainty. Traditional graph theory often falls short in capturing real-world networks where the relationships are not uniform but instead change in intensity or reliability. Fuzzy coalition graphs address this issue by enabling groups of vertices to collaborate in controlling the network, rather than relying on a single set. This is especially useful in systems like social networks, communication grids, and biological networks, where individual elements cannot fully dominate the network alone, but groups can work together to achieve control. This method supports the study of group dynamics, decision-making, and resilience in networks, particularly when information is incomplete or the network is evolving.
The primary hypothesis is that fuzzy coalition graphs can more effectively model real-world networks by capturing the teamwork and interdependence among elements. Additionally, we hypothesize that these graphs can improve the distribution of resources and decision-making in complex networks, such as smart cities or essential infrastructure systems. Testing these ideas aims to show that fuzzy coalition graphs can enhance our understanding and management of systems that depend on cooperation and flexibility in changing conditions.
1.3. Methodology
In this research, we focus on the concept of fuzzy coalition graphs , which are designed to represent coalitions in settings where individual entities cannot fully dominate or control the system alone. The paper targets a class of problems in which interconnected agents (such as companies, infrastructure systems, or nations) need to form coalitions for a common objective, with an emphasis on minimizing individual risks through cooperation. This is particularly relevant for smart city infrastructures, where entities like transportation, energy, and healthcare systems are interconnected but vulnerable to cyber-attacks. By using , this paper demonstrates how collaboration can lead to resilient, comprehensive cybersecurity strategies. This research addresses the challenge of forming coalitions that minimize risk in interconnected systems, such as cybersecurity infrastructures in smart cities. The class of solutions explored here involves coalition structures that enhance collective security by ensuring that no single entity has to defend itself alone. Our approach uses fuzzy coalition graphs () to represent these coalitions, with each vertex representing a critical infrastructure and each strong arc representing a secure connection or cybersecurity partnership. The methodology establishes key boundary conditions essential for coalition formation. First, we ensure mutual dependency for risk reduction, where systems form coalitions only when they cannot independently secure themselves. This dependency defines the necessity for each partnership, ensuring that coalition members are actively supporting each other’s cybersecurity needs. Additionally, connectivity is a priority, each coalition connects directly with at least one other critical system, minimizing isolated vulnerabilities and enabling a robust, interlinked defense network. Lastly, the risk distribution is balanced, with each coalition designed to share cybersecurity resources equitably, ensuring that no single system is overburdened by risk. This methodological structure provides a systematic approach to forming coalitions, ensuring that each coalition meets our defined boundary conditions for risk minimization. The result is an efficient coalition network that promotes optimal cybersecurity collaboration and effective risk-sharing across interconnected systems, exemplified in the smart city scenario used in this research.
In this study, we investigate fuzzy coalitions that comprise
within
Our method can be used for sets with different attributes, allowing for easier modeling of complex systems.
Section 1.1 provides a concise review of the existing literature on fuzzy graph theory, focusing on concepts such as strong domination, coalition formations, and their applications in interconnected systems. In
Section 1.2, we discuss our motivation for studying fuzzy coalition graphs and their relevance in modeling real-world systems characterized by complexity and interdependency. In
Section 1.3, the methodology involves constructing fuzzy coalition partitions in fuzzy graphs by identifying strong arcs, evaluating strong domination, and determining coalition partners and
-partitions. In
Section 2, we introduce fuzzy coalitions and fuzzy coalition partitions. A fuzzy coalition is when different sets of vertices join together to form a strongly dominating set, even if they cannot do so alone. We also explain how to group the vertices of a fuzzy graph into subsets that can work together. In
Section 3, we define the fuzzy coalition graph (
) and show that any fuzzy graph
can be represented as the
of another fuzzy graph
. This shows how useful the
structure is. We also provide an algorithm for finding fuzzy coalition graphs, which helps identify partners and build the
more easily. In
Section 4, we discuss how fuzzy coalition graphs can be used in real life, such as for social networks, communication networks, and traffic management. In social networks, these graphs can represent influential groups. In communication networks, they can help improve connections between nodes. In traffic management, they can help manage congestion by showing how different routes work together. Overall, fuzzy coalition graphs make it easier to solve problems with complex relationships.
2. Bounds for Fuzzy Coalition and Fuzzy Coalition Partition in Fuzzy Graphs
In this section, we derive bounds for and identify having relatively small values for
Definition 1. In a a fuzzy coalition is formed by two disjoint vertex sets, and neither of which is a but whose union is a . and are referred to as coalition partners.
Definition 2. A fuzzy coalition partition, also known as an partition, in a has a partition , where each subset in is either a singleton or does not act as a by itself but makes a fuzzy coalition with another subset in The is defined as the maximum order of subsets in an partition of and a partition of having order is called a partition.
Example 1. Consider a with vertices , where the membership values of the vertices are , , , , . The edges have the following membership values , , , , , , which are given below in Figure 1. The edges are strong arcs, since their weights are at least as great as the strength of connectedness between the respective vertices.
The Partition is a of . No set of is a . But and form ; and form . Thus every set forms a with at least one other set. Hence, , and is an .
Theorem 1. Every can be partitioned into an
Proof. Consider as a partition of of a and that is the of We assume that each , where is a minimal in If any is not a minimal, we can enhance it by taking a minimal and adding the difference in the set In a when a minimal where is not a singleton, it is split into two non-empty subsets, and These subsets, while not strongly dominating on their own, will together form a that strongly dominates the . By following this procedure for each , where , a new of sets is generated. In this collection, every set is either a singleton or not a that pairs with another set in to form a
If is a singleton that strongly dominates, combining it into instantly produces an of with an of at least On the other hand, if is a minimal that contains more than one vertex, it can be divided into two non- and included in , thus creating an of with an of at least , which exceeds If is not a minimal , then let be a minimal Partition into two non-empty, non- and which form a Define and add and to
Since cannot be a (otherwise, would have more than disjoint , which contradicts the definition of ), there are two cases to consider:
Case 1. If forms a with any other non- in then including to produces an of with an of at least which is greater than
Case 2. does not form a with any set in and replace it with the union This modification ensures that still represents a of with at least
In all cases, we have constructed a for thereby proving that every indeed has a □
Proposition 1. For a of then
Proof. Let be a with such that where represents the no. of vertices in The is defined as the max - number for which there exists a , of . Each is either a singleton or a non- that pairs with another set in the partition to form a
To establish the
, consider the trivial partition
where the whole
is treated as a single set. Since
itself is trivially a
in the
this partition is a valid
Consequently, the
must satisfy:
For the , consider the partition where each vertex forms its own singleton set This partition consists of disjoint subsets of and since this represents the maximum possible number of disjoint subsets that can be formed from Since each vertex in a can form a singleton on its own, this partition is a valid Therefore, the cannot exceed Thus,
Hence, □
Proposition 2. If is a without and , then
Proof. Consider as a without We start with a minimal of where We know that ensures that every vertex in is either in or strongly dominated by at least one vertex in Since has no , every vertex is neighbor to at least one vertex in and no single vertex can strongly dominate the entire , which implies that is at least and at most To form a , we consider the set and its complement in Each vertex in can be a singleton . For the remaining vertices, each can be paired with vertices in to create coalitions. This process generates at least subsets, as each vertex in forms a separate subset, and the remaining vertices are arranged in s with these subsets. Since the is the max number of sets in a valid and our partition with subsets is valid, it follows that Thus, is bounded above by completing this proof. □
Proposition 3. If is a with vertices and , and if there are vertices in with degree then the inequality
Proof. Since at least three sets are required in any , because two sets alone cannot strongly dominate the entire . This gives the For the vertices of degree each forms a singleton contributing sets. The remaining vertices, having degrees less than must form at least two to strongly dominate the Thus, the is at least giving Combining these, we conclude □
The limits provided in Proposition 3 are precise for fuzzy star graphs with as .
Now, let us analyze that contain . Let be a of with a non-empty subset consisting of Let represent a of Since has none of the sets in can be singleton Therefore, each set in cannot strongly dominate the individually and must form a with another set If more than two sets in include vertices, this implies they cannot form . As a result, the from can only be included in at most two sets in the partition. Assume and Then, for all Consequently, for cannot participate in any involving in a and can only be part of a maximum of two sets in a
Observation 1. The following is true if is a of with a non-empty set I of
- 1.
- 2.
and are satisfied for some by the partition of
Theorem 2. If is a without and min - deg then
Proof. Let be a of with and let be a vertex with degrees Let be the neighbors of Since has no Define a partition of where for and To show that is a of , observe that none of the sets in are a , as has no The neighbors of are divided into two groups: those without neighbors outside and those with at least one neighbor outside The first group strongly dominates and the second group strongly dominates the first group. The set strongly dominates the second group. Thus, every set for is a of confirming that is a of with Hence, □
Proposition 4. The graph has a non-empty set of Let It follows that
Proof. Consider a with The induced which is restricted to has a min - deg According to Theorem 2 for with no if the min - deg of is then the of satisfies Since the in does not affect the strongly dominating properties of the of the full graph must accommodate at least the required by Thus, the of the original must be at least Therefore, we have □
Proposition 5. For a with no if is a simplicial vertex, then
Proof. Let be a , where is a simplicial vertex. Since has no cannot strongly dominate the entire on its own. The represents its number of neighbors. To fully strongly dominate at least sets are required, as and its neighbors cover part of the but additional sets are necessary to strongly dominate the remaining vertices. Therefore, the satisfies □
Theorem 3. Let be a with max - deg and let be an If then is part of at most
Proof. Consider as an of the and let be a subset within the partition. If is a it must consist of a single vertex and cannot participate in any Now, assuming that is not a , let be not strongly dominated by Any set in that forms a with is restricted by the size of which is Given that the max - deg is in it follows that can be part of at most □
Proposition 6. If is a of with max - deg and a non-empty set of then or
Proof. Let be a of with max - deg and a non-empty set of No set containing vertices from can strongly dominate the Therefore, the must include at least two sets that strongly dominate the non-, while also accounting for If the graph has only and one other set, the is exactly However, if there are additional vertices with degrees up to the is constrained by the maximum degree, resulting in Thus, is either or depending on the presence of non- □
Next, we conclude by identifying the with small . Specifically, we describe the structure of for which as well as those isolate-free , where These findings offer a clear characterization of such highlighting their properties in terms of minimal values.
Theorem 4. Let be an Then,
- 1.
if and only if
- 2.
if and only if or for
Proof. (1) It is an easy process to prove that the only with , is trivial , .
- (2)
Based on the previous discussions , if for , or . On the other hand, suppose that must have according to For any the results hold if or Therefore, we can conclude that has at least one edge and
□
We can assume is incomplete, since Additionally, according to Proposition 3, has no vertices of degree. There is a contradiction if : and Therefore, can be assumed. At least one exists in according to Proposition 2. Let represent the collection of of . With a min - deg of at least is a of
Take note that there is not a minimal of for any of The complement is a substantially of according to Ore’s Theorem. While and are individually of note that none of or strongly dominate Consequently, there is a contradiction: the partition of is a of with
Theorem 5. Let be a with no having vertices. If or for then
Proof. Using the previous context, it is straightforward to conclude that, for , . Now, suppose that . From Theorem 4, we can obtain that and . The graph must belong to the set , since for these graphs , as expected when . Now, assume . Proposition 2 implies that must contain at least one , since it does not have any . Let be a in . Proposition 3 states that if is the only in , then . Now, examine the induced by . Notice that is not strongly dominated by any vertex in . Therefore, a possible -partition of is . It follows that , since . Theorem 4 suggests that must be the complement of a complete , that is , for . Thus, for , . □
3. Fuzzy Coalition Graphs and Its Algorithm
In
Section 3, we define
and show that every fuzzy graph
corresponds to a
. The
is constructed by identifying subsets of vertices in
G that form
, where these subsets together act as
. We demonstrate that each vertex in
represents a
in
, with edges connecting
. This correspondence ensures that the key properties of strong domination are preserved in the
. Thus, the
simplifies the analysis of
dynamics in
. We introduce an algorithm that facilitates this transformation, which identifies subsets of vertices within
that act as coalitions and ensures that the corresponding graph
preserves the properties necessary for coalition analysis.
Definition 3. Let be a with . The fuzzy coalition graph of is the with , where , corresponding one-to-one with the sets of and the two vertices and are adjacent in if and only if the sets and are in ; that is, neither nor are of but is a of
Example 2. The complete has exactly one , namely its singleton partition , for which . That is, the of with its singleton partition is isomorphic to the complement of . The singleton of the cycle gives refer in Figure 2, while the of results in refer in Figure 3. Theorem 6. For any there is a and some of such that
Proof. Let be a with the where each vertex has a degree at least and each vertex is an isolate. Let and where We will construct a and a of such that the graph of and is a isomorphic to
We begin the construction of with a complete whose vertices are labeled corresponding to the non- of We will refer to these as the base vertices of since we will add additional vertices to Our partition of begins as a singleton partition, and we denote the sets of as for each We will add to the sets in the partition as we build
For each edge we proceed as follows. Let
- 1.
Add two new vertices and to
- 2.
Add edges between and all of the base vertices except for Similarly, add edges between and all of the base vertices except for Thus, each of the vertices and has degree in
- 3.
Add vertex to the set and add vertex to the set
For each edge we proceed as follows.
- 4.
Add one new vertex to
- 5.
Add edges between and all of the base vertices except for and Thus, vertex has degree in
- 6.
Add the vertex to any set of the partition except for and
Finally, if is isolated in then it necessarily corresponds to a strongly dominating vertex in Thus, we conclude our construction of by adding vertices to labeled corresponding to the isolates in Then, add edges such that each of these vertices is a strongly dominating vertex in We extend so that each is in a singleton set of for
- 7.
Each edge in is connected to either at least one base vertex or a strongly dominating vertex.
- 8.
No set in the partition is a of This follows since the degree of in is at least one, in which case there exists at least one edge incident to and therefore no vertex in can strongly dominate in
- 9.
If is an edge in then and form a coalition in because the base vertices and collectively strongly dominate every vertex in
- 10.
If is not an edge in then and do not form a in because of the vertex which is not adjacent to either or and is thus not strongly dominated by any vertex in
- 11.
Each is a strongly dominating vertex in so is an isolated in
It follows that is a of and that □
Proposition 7. For every there is a and a of such that and every set is an independent set.
Proof. Using Theorem 6, consider as the of the such that Let be the constructed from the by deleting all edges between two vertices in the same set in for all Let be the vertex partition of where ∀ It is easy to see that forms a in Therefore, □
Algorithm
The Algorithm 1 for constructing the is outlined as follows:
- (1)
We initialize an empty partition, to group the coalition partners based on strong arcs.
- (2)
Coalition partners are identified by evaluating pairs of vertex sets; if neither set forms a strongly dominating set alone but their union does, they are marked as coalition partners.
- (3)
The is then built by evaluating each vertex to determine if it can strongly dominate individually or if it requires a coalition.
- (4)
The is constructed by adding edges between coalition partners who together form a strongly dominating set.
Algorithm 1 Algorithm for constructing the |
Input: with vertex set .
Output: , where is the .
Initialize an empty partition . Initialize the . Step 1: Identify - (a)
For each pair of vertex sets (where ):
- i.
Check if and are not individually. - ii.
If forms a :
Step 2: Construct - (a)
For each vertex :
- i.
If is a , add as a singleton set to . - ii.
Otherwise, find a set such that forms a .
- (b)
Repeat this process to ensure is the largest possible partition, where all subsets are either or .
Step 3: Build the - (a)
For each pair of sets :
- i.
Check if and are (i.e., forms a ). - ii.
If true, add an edge between and in .
Return the , along with the .
|
4. Application for Fuzzy Coalition Graphs
The concept of a can be applied in real-life scenarios where multiple agents (e.g., companies, individuals, or nations) need to form coalitions to achieve a common goal, particularly when individual agents cannot fully dominate or control the system alone. In a smart city, various entities (such as traffic management systems, power grids, water supply systems, hospitals, etc.) are interconnected via an IoT (Internet of Things) infrastructure. These systems are highly vulnerable to cyber-attacks, and no single entity can entirely safeguard the city’s infrastructure from these threats. Collaboration is essential.
Let us consider a for the cybersecurity collaboration of a smart city. The graph involves seven critical infrastructures that need to work together to protect the city from cyber threats. We will label these infrastructures as vertices and define the strong arcs (representing strong cybersecurity partnerships) between them.
Consider critical systems as vertices: : transportation system, : energy grid, : water supply system, : healthcare system, : public safety system, : waste management system, :communication network.
Consider cybersecurity alliances as strong arcs:: the transportation and energy grid share cybersecurity resources, : the energy grid and water supply system have a strong cybersecurity partnership, : the water supply and healthcare systems collaborate, : the healthcare and public safety systems work together for cyber defense,: the public safety and waste management systems are strongly connected, : the waste management and communication networks are partners,: the communication network and transportation system, : the transportation and water supply system, : the energy grid and healthcare system, : the healthcare and waste management system.
The membership values for each system in the smart city’s cybersecurity coalition are assigned based on their relative importance, vulnerability to cyber-attacks, and interdependence with other systems. The transportation system is assigned a value of due to its crucial role in the city’s functioning and its connections to other critical systems like energy and communication. The energy grid is given the highest value of , reflecting its central role in the city’s infrastructure. The water supply system , while important, has a slightly lower value of , as its direct impact on the city is less severe compared to systems like energy or transportation. The healthcare system is assigned , given its importance in public health and its vulnerability to cyber threats. The public safety system receives a value of , recognizing its role in maintaining safety, but having less interconnectedness than more critical systems. The waste management system is assigned , as its failure would not immediately affect core city functions, though it still plays a vital role in maintaining public health. Finally, the communication network , crucial for coordinating all systems, is given a value of , reflecting its importance in facilitating communication during crises. These values guide the formation of coalitions, ensuring the city’s infrastructure collaborates effectively to mitigate cybersecurity risks.
The membership values for the strong arcs between the systems in the smart city’s cybersecurity setup reflect how closely these systems need to work together. The arc between the transportation system
and energy grid
is given a high value of
, as any problem in one system can directly affect the other. The connection between the transportation system
and the communication network
has a value of
, showing a strong but slightly less critical collaboration. The water supply system
and healthcare system
have a value of
, as both are important but their cooperation is not as urgent as other systems. The healthcare system
and public safety system
have a value of
, indicating necessary but less intense cooperation. The arc between healthcare
and waste management
is set at
, showing moderate cooperation, as waste management plays a role in public health but is not as critical. Finally, the arc between waste management
and the communication network
has the lowest value of
, indicating a lower but still important connection. These values show the varying levels of cooperation needed for strong cybersecurity in the city’s infrastructure given in
Figure 4.
The graph shows which coalitions are connected and can collaborate for overall security (
Table 2).
(transportation and water supply) are linked to (energy grid and healthcare) and (public safety and communication network). (waste management) is linked to and , ensuring the entire network can respond to threats.
The .
The application of the concept to a graph with seven vertices results in the identification of s that reflect how smaller groups of systems form coalitions to dominate the entire network. However, based on the resulting and partition structure, the underlying relationships between these s resemble the following graph structure. This happened because
Thus, the coalition structure effectively forms the following graph due to the interconnected nature of the coalitions. Each system (or vertex) in the has edges connecting it to other system within the coalition.
In the fuzzy coalition partition , each coalition is assigned a fuzzy membership value that reflects the strength of collaboration between critical systems in the smart city’s cybersecurity efforts. The coalition , representing the transportation and water supply systems, has a membership value of , indicating a strong collaboration. The coalition , between the energy grid and healthcare systems, has a membership value of , suggesting a moderately strong partnership. The coalition , formed by the public safety and communication network systems, has the highest membership value of , reflecting a very strong relationship for cybersecurity efforts. The coalition , representing the waste management system, has a membership value of , indicating a weaker individual role in cybersecurity.
Additionally, the strong domination relationships between these coalitions are represented by membership values that quantify their influence on each other. For example, strongly dominates with a value of , indicating a moderate influence of the transportation and water supply systems over the energy grid and healthcare systems. Similarly, strongly dominates with a value of , showing a stronger impact on the public safety and communication systems. On the other hand, strongly dominates with a value of , and strongly dominates with a value of , indicating moderate to weak dominations.
These fuzzy membership values can help model the interdependencies and vulnerabilities of the critical infrastructures, illustrating the degree of collaboration and influence between different systems, and identifying areas where cybersecurity partnerships could be optimized for better protection.
These coalitions can help the city optimally allocate cybersecurity resources. Instead of each system defending itself, these groups can share intelligence, threat detection, and countermeasures.
The
Figure 5 shows the importance of collaboration across systems to achieve full coverage. No single system can protect the city on its own, but these coalitions ensure comprehensive cybersecurity.