Professional Documents
Culture Documents
com
Abstract
Let G = (V, E) be a simple, undirected and connected graph. A connected dominat-
ing set S ⊆ V (G) is a secure connected dominating set of G, if for each u ∈ V (G)\S,
there exists v ∈ S such that (u, v) ∈ E(G) and the set (S \ {v}) ∪ {u} is a connected
dominating set of G. The minimum cardinality of a secure connected dominating
set of G denoted γsc (G), is called the secure connected domination number of G. In
this paper, we show that the decision problems of finding a minimum secure con-
nected dominating set and a minimum secure total dominating set are NP-complete
for split graphs. We initiate the study of 2-secure domination and show that the
decision problem corresponding to the computation of 2-secure domination number
of a graph is NP-complete, even when restricted to split graphs or bipartite graphs.
Finally we show that given two positive integers k (≥ 2) and n (≥ max{4, k}) there
exists a graph G with |V (G)| = n and γsc (G) = k.
Keywords: Secure dominating set, split graph, NP-complete, total domination.
1
Thanks to everyone who should be thanked
2
Email: deepak.devendra@gmail.com
3
Email: pvsr@nitw.ac.in
4
Email: jp@nitw.ac.in
https://doi.org/10.1016/j.endm.2017.11.001
1571-0653/© 2017 Elsevier B.V. All rights reserved.
78 D. Lad et al. / Electronic Notes in Discrete Mathematics 63 (2017) 77–84
1 Introduction
Let G(V, E) be a simple, undirected and connected graph. We use commonly
used terminology and notations as found in popularly available texts such as
[2,7]. For a vertex v ∈ V (G), the (open) neighborhood of v in G is N (v)=
{u ∈ V (G) : (u, v) ∈ E(G)}, the closed neighborhood of v is defined as N [v] =
N (v) ∪ {v}. If S ⊆ V (G), then the (open) neighborhood of S is the set
N (S) = ∪v∈S N (v). The closed neighborhood of S is N [S] = S ∪ N (S). Let
S ⊆ V (G) and v be a vertex in S. The S-external private neighborhood of v
denoted epn[v, S] is defined as {w ∈ V (G)|N (w) ∩ S = {v}}.
A subset S of V (G) is a dominating set (DS) in G if for every u ∈ V (G) \ S,
there exists v ∈ S such that (u, v) ∈ E(G), i.e., N [S] = V (G). The domination
number of G is the minimum cardinality of a DS in G and is denoted by γ(G).
A set S ⊆ V (G) is said to be a secure dominating set (SDS) in G if for every
u ∈ V (G) \ S there exists v ∈ S such that (u, v) ∈ E(G) and (S \ {v}) ∪ {u}
is a dominating set. The minimum cardinality of a SDS in G is called the
secure domination number of G and is denoted by γs (G). A dominating set S
is said to be a connected dominating set (CDS), if the induced subgraph G[S]
is connected. Let S be a CDS in G. A CDS S is called a secure connected
dominating set (SCDS) in G, if for each u ∈ V (G) \ S, there exists v ∈ S such
that (u, v) ∈ E(G) and (S \ {v}) ∪ {u} is a CDS in G. The secure connected
domination number γsc (G) of G is the smallest cardinality of a SCDS in G.
A dominating set S is said to be a total dominating set (TDS), if the induced
subgraph G[S] has no isolated vertices. A TDS S is called a secure total
dominating set (STDS) of G, if for each u ∈ V (G) \ S, there exists v ∈ S
such that (u, v) ∈ E(G) and (S \ {v}) ∪ {u} is a TDS in G. The secure total
domination number γsc (G) of G is the smallest cardinality of a STDS in G.
Now, we state the theorem which has been proved in [1] with the following
definitions of leaf and support vertices. A leaf u of a graph G is a vertex of
degree one and the support vertex of a leaf u is the unique vertex v such that
(u, v) ∈ E(G). We denote by L(G) and S(G) be the set of leaves and support
vertices of G, respectively.
Theorem 2.2 Let G be a connected graph of order n ≥ 3 and let X be a
secure connected dominating set of G. Then
(i) L(G) ⊆ X and S(G) ⊆ X
(ii) No vertex in L(G) ∪ S(G) is an X-def ender .
The following decision problem for the connected domination number of a
graph is known to be NP-complete, even when restricted to split graphs [4].
Connected Domination Problem (CDOM)
Instance: An undirected and connected graph G and a positive integer k.
Question: Is γc (G) ≤ k ?
Formulated as a decision problem, the secure connected domination problem,
denoted by SCDOM, is defined as follows:
Secure Connected Domination Problem (SCDOM)
Instance: An undirected and connected graph G and a positive integer k.
Question: Is γsc (G) ≤ k ?
Theorem 2.3 SCDOM is NP-complete for split graphs
Proof. Clearly, the SCDOM is a member of NP, since we can check in poly-
nomial time whether or not a set of vertices is SCDS of G. Now let us show
how a polynomial time algorithm for SCDOM could be used to solve CDOM
in polynomial time. Given a positive integer k and split graph G whose vertex
set is partitioned into a clique Q and an independent set I, we construct a
graph G∗ with clique Q∗ and independent set I ∗ as follows.
V (G∗ ) = V (G) ∪ {x, y}, where x and y are newly introduced vertices,
E(G∗ ) = E(G) ∪ {(x, u) : ∀u ∈ V (G)} ∪ (x, y).
It is worth pointing out that G∗ is a split graph, where V (Q∗ ) = V (Q) ∪ {x}
and V (I ∗ ) = V (I) ∪ {y}. We also note that |V (G∗ )| = |V (G)| + 2 and
|E(G∗ )| = |E(G)| + |V (G)| + 1, and so G∗ can be constructed from G in poly-
nomial time. Next, we shall show that G has a CDS of size at most k if and
only if G∗ has a SCDS of size at most k + 2.
Let S be a CDS of size at most k in G. Then it is evident from Theorem 2.2
that S ∪ {x, y} is a SCDS of G∗ of cardinality k + 2 .
Conversely, suppose that G∗ has a SCDS S ∗ of size at most k + 2. Let
S = S ∗ ∩ V (G). It is clear that |S ∗ ∩ {x, y}| = 2 and hence |S | ≤ k. Let
80 D. Lad et al. / Electronic Notes in Discrete Mathematics 63 (2017) 77–84
w ∈ V (G)\S . Now if S ∗ becomes (S ∗ \{x})∪{w} then y is an isolated vertex
and it is no longer a CDS. Thus there exists v ∈ S such that (S ∗ \ {v}) ∪ {w}
is a CDS. Hence S is a SDS in G. Further since G is a split graph each vertex
u ∈ {S ∩ V (I)} can be replaced by a vertex v ∈ {N [u] ∩ V (Q)}. Thus S is
a SCDS in G and |S | ≤ k. Every SCDS is a CDS and hence S is a CDS of
size at most k in G. 2
The following decision problem for the total domination number of a graph is
known to be NP-complete, even when restricted to split graphs [5].
Total Domination Problem (TDOM).
Instance: An undirected and connected graph G and a positive integer k.
Question: Is γt (G) ≤ k ?
Formulated as a decision problem, the secure total domination problem, de-
noted by STDOM is defined as follows:
Secure Total Domination Problem (STDOM).
Instance: An undirected and connected graph G and a positive integer k.
Question: Is γst (G) ≤ k ?
Theorem 2.4 STDOM is NP-complete for split graphs.
Proof. A SDS is a STDS if it contains no isolated vertices. The proof used
to show that the SCDOM is NP-complete can be used to show that STDOM
is NP-complete. 2
The following decision problem for the secure domination number of a graph is
known to be NP-complete, even when restricted to split graphs and bipartite
graphs citeosd.
Secure Domination Problem (SDOM)
Instance: An undirected and connected graph G and a positive integer k.
Question: Is γs (G) ≤ k ?
Formulated as a decision problem, the 2-secure domination problem, denoted
by 2-SDS is defined as follows:
2-Secure Domination Problem (2-SDOM)
Instance: An undirected and connected graph G and a positive integer k.
Question: Is γ2s (G) ≤ k ?
Theorem 2.9 2-SDOM is NP-complete for split graphs.
G having no vertex S -defending it in S and let w ∈ A. Since S ∗ is a 2-SDS
there must exist at least two vertices which S ∗ -defends w in G∗ by lemma 2.8.
But NG∗ [w] ∩ (S ∗ \ S ) = {x} i.e., only single vertex x S ∗ -defends w in G∗ ,
hence the contradiction. Therefore A is an empty set. Hence G has a SDS of
size at most k. 2
Proof. We form the graph G such that V (G) = {v1 , v2 , v3 , ..., vn } and E(G) =
{(vi , vi+1 ) | 1 ≤ i ≤ k − 1} ∪ {(v1 , vj ) | k + 1 ≤ j ≤ n} ∪ {(vk , vj ) | k + 1 ≤
j ≤ n}. Let Vp = {v1 , v2 , v3 , ..., vk }, Vq = {vk+1 , vk+2 , ..., vn }, Ve = {v1 , vk },
V2e = {v2 , vk−1 } , Vwe = {v2 , v3 , v4 , ..., vk−1 } and Vw2e = Vwe \ V2e .
Let S be any SCDS of graph G such that |S| = k. From [1] we know that
γsc (Pn ) = n for all n ≥ 3.
Case 1 n = k.
Clearly G ∼
= Pk hence the result.
Case 2 n = k + 1.
As G ∼
= Ck+1 the result follows from [1].
Case 3 n > k + 1.
In this case we also show that γsc (G) = k. First it can be easily seen that Vp
is a SCDS of G. Hence γsc (G) ≤ k. Now we show that γsc (G) ≥ k.
Claim 1: Every SCDS of G must contain the two vertices in the set Ve .
Proof : Let R be any SCDS If we remove v1 (or vk ) from the set R then vk (or
v1 ) will have n − k − 1 external private neighbours and it is no longer SCDS
[1]. Hence the claim.
Claim 2: Vw2e is part of every SCDS.
Proof : Let S ⊆ V (G) of cardinality at least k such that it does not contain
at least one vertex v ∈ Vw2e . Now, there exists a vertex w ∈ Vq \ S which will
not be securely defended and set S is not a SCDS. Hence, Vw2e is part of every
SCDS.
Claim 3: At least one vertex from V2e should be a part of every SCDS.
Proof : Let us prove it by contradiction, by assuming there exists some SCDS
S with no vertex from V2e . However, by our assumption induced subgraph
G[S] is no longer connected to any vertex of Vw2e , which is a contradiction.
If only one vertex from V2e is included in any SCDS S, then S should contain
at least one vertex from Vq , otherwise G[S] is not even connected. From claim
84 D. Lad et al. / Electronic Notes in Discrete Mathematics 63 (2017) 77–84
1,2 and 3 we say that γsc (G) ≥ k. Hence γsc (G) = k. Therefore there exists a
graph G = (V, E) such that γsc (G) = k and |V | = n. 2
4 Conclusion
In this paper, we have shown that secure connected (total) dominating set and
2-secure dominating set problems are NP-complete for split graphs. We have
also shown that 2-secure domination problem is NP-complete for bipartite
graphs. Determining computational complexity of secure connected (total)
domination for bipartite graphs is still open. It will be interesting to see
if same results can be obtained for secure connected (total) domination for
chordal graphs and circle graphs.
Acknowledgements
We are grateful to Prof. S. Arumugam, Director, n-CARDMATH and
Senior Professor (Research), Kalasalingam University, for introducing us to
the concept of secure domination in graphs and suggesting its generalizations.
5 Bibliographical references
References
[1] Cababro, Amerkhan G., Sergio S. Canoy, and Imelda S. Aniversario, Secure
connected domination in a graph, International Journal of Mathematical
Analysis 8 (2014), 2065-2074.
[2] Chartrand, G., and P. Zhang, “Introduction to Graph Theory,” Tata McGraw-
Hill, New Delhi, (2005).
[3] Cockayne, E.J, P.J.P. Grobler, W.R. Grundlingh, J. Munganga, and J.H. van
Vuuren, Protection of a graph, Util. Math. 67 (2005), 1932.
[4] Guha, S., and S. Khuller, Approximation algorithms for connected dominating
sets, Algorithmica 20 (1988), 374-387.
[5] Laskar, R.C., and J. Pfaff , ”Domination and irredundance in split graphs,”
Technical Report 430, Clemson University, Dept. Math. Sciences, (1983).
[6] Merouane, H.B.,and Mustapha Chellali, On secure domination in graphs,
Information Processing Letters 1150 (2015), 786-790.
[7] West, D.B., “An Introduction to Graph Theory,” 2nd Ed., Prentice-Hall, N.J.,
(1946).