Skip to main content
Log in

Secure domination in rooted product graphs

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

Abstract

A secure dominating set of a graph G is a dominating set S satisfying that for every vertex \(v\in V(G){\setminus } S\) there exists a neighbour \(u\in S\) of v such that \((S\cup \{v\}){\setminus } \{u\}\) is a dominating set as well. The secure domination number, denoted by \(\gamma _s(G)\), is the minimum cardinality among all secure dominating sets of G. This concept was introduced in 2005 by Cockayne et al. and studied further in a number of works. The problem of computing the secure domination number is NP-Hard. This suggests finding the secure domination number for special classes of graphs or obtaining tight bounds on this invariant. The aim of this work is to obtain closed formulas for the secure domination number of rooted product graphs. We show that for any graph G of order n(G) and any graph H with root v, the secure domination number of the rooted product graph \(G\circ _vH\) satisfies one of the following three formulas, \(\gamma _{s}(G\circ _vH)=n(G)(\gamma _{s}(H)-1)+\gamma (G)\), \(\gamma _{s}(G\circ _vH)= n(G)(\gamma _{s}(H)-1)+\gamma _{s}(G)\) or \(\gamma _{s}(G\circ _vH)= n(G)\gamma _{s}(H)\), where \(\gamma (G)\) denotes the domination number of G. We also characterize the graphs that satisfy each of these expressions. As a particular case of the study, we derive the corresponding results for corona graphs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Araki T, Yamanaka R (2019) Secure domination in cographs. Discrete Appl Math 262:179–184

    Article  MathSciNet  Google Scholar 

  • Araki T, Yumoto I (2018) On the secure domination numbers of maximal outerplanar graphs. Discrete Appl Math 236:23–29

    Article  MathSciNet  Google Scholar 

  • Boumediene Merouane H, Chellali M (2015) On secure domination in graphs. Inform Process Lett 115(10):786–790

    Article  MathSciNet  Google Scholar 

  • Burger AP, Henning MA, van Vuuren JH (2008) Vertex covers and secure domination in graphs. Quaest Math 31(2):163–171

    Article  MathSciNet  Google Scholar 

  • Cockayne EJ (2007) Irredundance, secure domination and maximum degree in trees. Discrete Math 307:12–17

    Article  MathSciNet  Google Scholar 

  • Cockayne EJ, Favaron O, Mynhardt CM (2003) Secure domination, weak Roman domination and forbidden subgraphs. Bull Inst Combin Appl 39:87–100

    MathSciNet  MATH  Google Scholar 

  • Cockayne EJ, Grobler PJP, Gründlingh WR, Munganga J, van Vuuren JH (2005) Protection of a graph. Util Math 67:19–32

    MathSciNet  MATH  Google Scholar 

  • Haynes T, Hedetniemi S, Slater P (1998) Domination in graphs: volume 2 advanced topics. CRC pure and applied mathematics. Taylor & Francis, Baco Raton

    Google Scholar 

  • Haynes TW, Hedetniemi ST, Slater PJ (1998) Fundamentals of domination in graphs, Chapman and Hall/CRC pure and applied mathematics series. Marcel Dekker, Inc., New York

    Google Scholar 

  • Jha A, Pradhan D, Banerjee S (2019) The secure domination problem in cographs. Inform Process Lett 145:30–38

    Article  MathSciNet  Google Scholar 

  • Klostermeyer WF, Mynhardt CM (2008) Secure domination and secure total domination in graphs. Discuss Math Graph Theory 28(2):267–284

    Article  MathSciNet  Google Scholar 

  • Li Z, Shao Z, Xu J (2017) On secure domination in trees. Quaest Math 40(1):1–12

    Article  MathSciNet  Google Scholar 

  • Pradhan D, Jha A (2018) On computing a minimum secure dominating set in block graphs. J Combin Optim 35(2):613–631

    Article  MathSciNet  Google Scholar 

  • Valveny M, Rodríguez-Velázquez JA (2019) Protection of graphs with emphasis on cartesian product graphs. Filomat 33(1):319–333

    Article  MathSciNet  Google Scholar 

  • Zou Y, Liu J, Hsu C, Wang YL (2019) A simple algorithm for secure domination in proper interval graphs. Discrete Appl Math 260:289–293

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work has been supported by two grants from “Ministerio de Economía y Competitividad, Agencia Estatal de Investigación (AEI)” and “Fondo Europeo de Desarrollo Regional (FEDER)” (Grant Nos. MTM2016-78227-C2-1-P and MTM2017-90584-REDT), Spain. The author Luis Pedro Montejano is a Serra Húnter Fellow.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luis Pedro Montejano.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hernández-Ortiz, R., Montejano, L.P. & Rodríguez-Velázquez, J.A. Secure domination in rooted product graphs. J Comb Optim 41, 401–413 (2021). https://doi.org/10.1007/s10878-020-00679-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10878-020-00679-w

Keywords

Mathematics Subject Classification

Navigation