Skip to main content
Log in

Secure domination of some graph operators

  • Original Research
  • Published:
Indian Journal of Pure and Applied Mathematics Aims and scope Submit manuscript

Abstract

A set \(S \subseteq V(G)\) is said to be secure if the security condition, for every \(X \subseteq S\), \(\left| N[X] \cap S\right| \ge \left| N[X] - S\right| \) holds. Now, a set \(S \subseteq V(G)\) is secure dominating if it is both secure and dominating. The secure domination number of G is the minimum cardinality of a secure dominating set in G. In this paper, we have obtained results regarding the secure domination number of some graph operators.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. R. Balakrishnan, K. Ranganathan (2012). A Textbook of Graph Theory, Springer, New York, USA, .

    Book  MATH  Google Scholar 

  2. J. Barnett, A. Blumenthal, P. Johnson, C. Jones, R. Matzke, E. Mujuni (2017). Connected minimum secure dominating sets in grids, AKCE Int. J. Graphs Comb. 14, 216–223.

    Article  MathSciNet  MATH  Google Scholar 

  3. R. C. Brigham, R. D. Dutton, S. T. Hedetniemi (2007). Security in Graphs, Discrete Appl. Math. 155, 1708–1714.

    Article  MathSciNet  MATH  Google Scholar 

  4. Chithra M. R., Manju K Menon (2020). Secure Domination of Honeycomb Networks, J. Comb. Optim. 40 (1), 98–109.

    Article  MathSciNet  MATH  Google Scholar 

  5. E.J. Cockayne, P.J.P. Grobler, W.R. Grundlingh, J. Munganga, J.H. van Vuuren (2005). Protection of a graph, Util. Math. 67, 19–32.

    MathSciNet  MATH  Google Scholar 

  6. O. Duginov (2017). Secure total domination in graphs: bounds and complexity, Discrete Appl. Math. 222, 97–108.

    Article  MathSciNet  MATH  Google Scholar 

  7. R. D. Dutton (2009). On a graph’s security number, Discrete Math. 309, 4443–4447.

    Article  MathSciNet  MATH  Google Scholar 

  8. R. D. Dutton, Robert Lee, R. C. Brigham (2008). Bounds on a graph’s security number, Discrete Appl. Math. 156, 695–704.

  9. A. Jha, D. Pradhan, S. Banerjee (2019). The secure domination problem in cographs, Inform. Process. Lett. 145, 30–38.

    Article  MathSciNet  MATH  Google Scholar 

  10. W. F Klostermeyer, C.M. Mynhardt (2008). Secure domination and secure total domination in graphs, Discuss. Math. Graph Theory 28(2) 267–284.

    Article  MathSciNet  MATH  Google Scholar 

  11. P. Kristiansen, S.M. Hedetniemi, S.T. Hedetniemi (2004). Alliances in graphs, J. Combin. Math. Combin. Comput. 48, 157–177.

    MathSciNet  MATH  Google Scholar 

  12. W. Lin, J. Wu, P.C.B. Lam, G. Gu (2006). Several parameters of generalized Mycielskians Discrete Appl. Math. 154, 1173–1182.

    Article  MathSciNet  MATH  Google Scholar 

  13. E. Munarini, A. Scagliola, C. Perelli Cippo, N. Zagaglia Salvi (2008). Double Graphs, Discrete Math.308, 242–254.

    Article  MathSciNet  MATH  Google Scholar 

  14. Peter Johnson, Cadavious Jones (2013). Secure dominating sets in graphs, in: V.R. Kulli (Ed.), Advances in Domination Theory II, Vishwa International Publications, 1–9. ISBN 81-900205-6-0.

  15. D. Pradhan, A. Jha (2018). On computing a minimum secure dominating set in block graphs. J. Comb. Optim. 35(2), 613–631.

    Article  MathSciNet  MATH  Google Scholar 

  16. H. Wang, Y. Zhao, Y. Deng (2018). The complexity of secure domination problem in graphs. Discuss. Math. Graph Theory 38(2), 385–396.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The authors thank the referees for their valuable suggestions. The authors thank their teacher Professor A. Vijayakumar, Emiritus Professor, Department of Mathematics, Cochin University of Science and Technology for his suggestions for the improvement of the content in this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. R. Chithra.

Additional information

Communicated by Shariefuddin Pirzada.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Menon, M.K., Chithra, M.R. Secure domination of some graph operators. Indian J Pure Appl Math 54, 1170–1176 (2023). https://doi.org/10.1007/s13226-022-00331-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13226-022-00331-9

Keywords

Mathematics Subject Classification

Navigation