Next Article in Journal
Quantifying the Uncertainty of Reservoir Computing: Confidence Intervals for Time-Series Forecasting
Previous Article in Journal
Spider Wasp Optimizer-Optimized Cascaded Fractional-Order Controller for Load Frequency Control in a Photovoltaic-Integrated Two-Area System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Co-Secure Domination in Jump Graphs for Enhanced Security

by
Manjusha Pothuvath
1,
Radha Rajamani Iyer
2,
Ahmad Asiri
3 and
Kanagasabapathi Somasundaram
2,*
1
Department of Mathematics, Amrita School of Physical Sciences, Amrita Vishwa Vidyapeetham, Kochi 682024, India
2
Department of Mathematics, Amrita School of Physical Sciences, Amrita Vishwa Vidyapeetham, Coimbatore 641112, India
3
Department of Mathematics, Applied College at Mahail Aseer, King Khalid University, Asir-Abha 61421, Saudi Arabia
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(19), 3077; https://doi.org/10.3390/math12193077
Submission received: 14 September 2024 / Revised: 25 September 2024 / Accepted: 26 September 2024 / Published: 1 October 2024
(This article belongs to the Section Mathematics and Computer Science)

Abstract

:
This study proposes a general approach to protect graphs using co-secure domination within jump graphs. In the context of graphs, a dominating set is a group of vertices that are either directly linked or connected to all other vertices within the graph. The minimum cardinality of the dominating set in a graph G is called the domination number γ ( G ) . A set S V of a graph G is called a co-secure dominating set, if, for all u S , there exists a node v N ( u ) and in V S so that ( S { u } ) { v } dominates the graph G. γ c s ( G ) , the co-secure domination number, is the cardinality of a co-secure dominating set with minimum vertices within the graph G. It is a notable protective strategy in which the nodes that are attacked or damaged in an interconnection network can be replaced with alternative nodes to ensure network security. In a jump graph J ( G ) , the vertices are the edges of G and the adjacency of the vertices of J ( G ) are given by the condition that these edges are not adjacent in G. This paper explains how γ ( G ) and γ c s ( J ( G ) ) are related for the jump graph of various graph classes. The study further determines the exact value for γ c s ( J ( G ) ) of specific standard graphs. Additionally, the study characterizes γ c s ( J ( G ) ) = 2 and a tight bond is identified for γ c s ( J ( G ) ) , particularly for G with specific conditions.

1. Introduction

Graph theory provides a framework for modeling interconnection networks as simple graph G = ( V , E ) . We denote cardinality of a vertex set as | V | = n and the cardinality of the edges as | E | = m in G . In interconnection networks, the network components such as computers, routers, and nodes are represented as vertices while the connections or communication links between them as the edges of the graph. This representation facilitates the analysis and implementation of security strategies within interconnection networks [1,2]. It aids in identifying critical nodes, assessing network vulnerabilities, designing redundant backup nodes for critical elements, implementing intrusion detection systems, and mitigating potential threats or attacks.
Domination in graphs plays a vital role in protecting interconnection networks. A set D V of G is a dominating set (DS), if every vertex in V is either in D or is directly linked to at least one vertex in D [3]. The strategical placement of mobile guards at particular vertices of the network secures an interconnection network from a variety of attacks and that set of guards forms a dominating set. The smallest number of guards needed to protect the entire network is the domination number (DN), and it is denoted by γ ( G ) . To enhance network resilience against node failures or attacks, various domination variants have emerged [4]. Co-secure domination (CSD) is one such variant that provides an additional layer of protection to the network by allowing the replacement of attacked or damaged nodes with an alternative one without affecting the criterion for dominating set [5]. The co-secure domination number (CSDN) γ c s ( G ) is the minimum number of guards required to secure the network by providing backup mobile guards. The historical basis of the concept of graph protection as well as various strategies for optimizing the existing models are described in [4,5,6]. A characterization of Mycielski graphs with γ c s ( G ) = 2 and 3 is given in [7,8]. An iterative formula for calculating the CSDN of Sierpinski networks is given in [9].
The essential graph concepts utilized in this paper are outlined below. For additional explanations on these basic concepts and key results related to domination, please refer to [3]. The degree of a vertex v G , denoted by d e g v , signifies the number of edges incident with v in a graph G. The maximum number of edges incidents with a vertex in G is Δ ( G ) and the minimum number of edges incidents with a vertex is denoted by δ ( G ) . The open neighborhood of a vertex v is defined as N ( v ) = { u V : u v E } and its closed neighborhood is denoted by N [ v ] , which is the set N ( v ) { v } . The number of neighbors of an edge e = u v is called the e d g e   d e g r e e d ( e ) , where d ( e ) = | N ( u ) N ( v ) | 2 . Let T V and v T ; if N ( u ) T = { v } , then u is a T- external private neighbor (epn) of v. The set of all T-epns of v is represented by E P N ( v , T ) [5]. For all the vertices u V , M a x { d ( u , v ) : v V } is the e c c e n t r i c i t y of u and the maximum eccentricity is the d i a m e t e r of the graph denoted by d i a m ( G ) . That is, d i a m ( G ) = M a x { e ( u ) : u V } . The circumference of a graph is defined as the length of the longest cycle, denoted as c ( G ) .
Various symbols are used to denote distinct graph classes. The path graph is represented as P n , the cycle graph as C n , and the complete graph as K n , where n indicates the number of vertices. Additionally, K m , n denotes the complete bipartite graph with two sets, one containing m vertices and the other containing n vertices, and K 1 , n denotes the star graph. The Cartesian product of two graphs G = ( V ( G ) , E ( G ) ) , and H = ( V ( H ) , E ( H ) ) , denoted by G H , is the graph with the vertex set V ( G ) × V ( H ) , and any two vertices ( u , v ) , ( u , v ) are adjacent if and only if either u = u and v v E ( H ) or v = v and u u E ( G ) . The vertex corona product of G and H is the graph G H , obtained by taking one copy of G, called the center graph, | V ( G ) | copies of H, called the outer graph, and making the i t h vertex of G adjacent to every vertex of the i t h copy of H, where 1 i | V ( G ) | . The vertex corona product is one of the well-known graph products. It has many real time applications in chemistry, computer, and social networks.

Line Graphs and Jump Graphs

The line graph of an undirected graph G is another graph L ( G ) in which each edge in G is a vertex in L ( G ) [10]. Two vertices in L ( G ) are adjacent if the corresponding edges of G are incident, and vice versa. This graph is also called the ’edge graph’ because it focuses on the connections between the edges of the original graph [11,12]. Some observations about the line graph of certain graph classes used in this article are given here [13].
  • L ( K 1 , n ) = K n ;
  • L ( C n ) = C n , n 3 ;
  • L ( P n ) = P n 1 , n 3 .
This article examines the CSDN of jump graphs J ( G ) , which are the complements of edge-independent edge graphs or line graphs [10]. Chartrand et al. [13] presented the concept of the jump graph and the domination number of these graphs was discussed by Maralabhavi et al. [14]. The domination number of the jump graphs γ ( J ( G ) ) was discussed in [14].
Figure 1 illustrates the transformation of G into its J ( G ) . The edges { 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 } of G serve as the vertices of J ( G ) . It is to be noted that edges that are adjacent in G are not adjacent in J ( G ) . Bold vertices indicate the dominating vertices. It is clear that all vertices in the original graph and its jump graph are either bold or adjacent to bold vertices.
This paper includes the following observations:
  • The determination of the exact values of the CSDN for jump graphs of specific standard graphs;
  • The calculation of the CSDN of jump graphs derived from various graphs classes, such as Windmill, Barbell, Sunlet, Helm, and Lict graphs;
  • The characterization of jump graphs with a CSDN of 2;
  • The establishment of a tight bond for the CSDN of jump graphs;
  • An investigation of the relationship between the CSDN of a jump graph and its underlying graph, particularly under specific conditions related to the graph’s circumference and other parameters.

2. CSDN of Jump Graphs

A set S V ( J ( G ) ) of a jump graph J ( G ) is called a co-secure dominating set (CSDS) if for every u S there exists a vertex v N ( u ) and in the compliment of S such that ( S { u } ) { v } dominates J ( G ) . The cardinality of the smallest co-secure dominating set is represented by γ c s ( J ( G ) ) , which is the co-secure domination number (CSDN) of the jump graph. If J ( G ) has isolated vertices, then CSDS does not exist.
Preliminary findings and observations about the CSDN of the line graph of P n , C n , and K n are summarized in [5,15]: γ c s ( L ( C n ) = γ c s ( C n ) = 2 n 5 , γ c s ( L ( P n ) ) = γ c s ( P n 1 ) = 2 n 5 , and γ c s ( L ( K 1 , n ) ) = γ c s ( K n ) = 1 .

Bounds and Exact Values for CSDN of Jump Graphs

The analysis of γ c s ( J ( G ) ) of certain graph families results in the following theorem. It is easy to prove the following two theorems.
Theorem 1.
1. 
γ c s ( J ( P n ) ) = 2 , n 5 .
2. 
γ c s ( J ( C n ) ) = 2 , n 5 .
3. 
γ c s ( J ( K n ) ) = 3 , n 5 .
4. 
If G is a Spider tree or a Lobster tree with n 5 , γ c s ( J ( G ) ) = 2 .
5. 
γ c s ( J ( K m , n ) ) = 2 , for all m 2 , n > 3 .
6. 
For the Wheel Graph W n , n 5 , γ c s ( J ( W n ) ) = 3 .
A careful analysis of CSDN with the jump graphs of distinct graph classes yielded the following result.
Corollary 1.
For a connected graph G with n vertices, then γ c s ( J ( G ) ) 2 .

3. Characterization of CSDN of Jump Graphs in Various Graph Classes

The jump graphs of certain derived graphs were analyzed for their CSDN, and a characterization of γ c s ( J ( G ) ) = 2 for these derived graphs was conducted. Graph families under consideration are (i) Cartesian product of graphs, (ii) Windmill graphs, (iii) Barbel graphs, (iv) line graphs, (vi) Sunlet graphs, and (vii) Helm graphs.
Theorem 2.
γ c s ( J ( G ) ) = 2 if G is any one of the following three graph families:
(i) 
G has no pendant vertices or G is a tree, and d i a m ( G ) 3 .
(ii) 
It is an Eulerian graph with n 3 .
Proof. 
Case (i): Suppose G has no pendant vertices and d i a m ( G ) 3 .
Consider a graph G with n vertices without isolated vertices, n 4 , m edges and d i a m ( G ) > 3 . Let u 1 , u 2 , , u n be the longest path in G and e 1 = u 1 u 2 , e 2 = u 2 u 3 , , e n 1 = u n 1 u n be the edges in G. By definition, the edges e 1 , e 2 , e 3 , …, e n 1 are vertices in J ( G ) . For the vertices e 1 and e n 1 in J ( G ) , N ( e 1 ) = { e 3 , e 4 , …, e n 1 } and N ( e n 1 ) = { e 1 , e 2 , e 3 , e 4 , …, e n 3 } [13]. Choose a subset S V ( J ( G ) ) , where S = { e 1 , e n 1 } . Since all the vertices of J ( G ) are either in S or in N ( e 1 ) or in N ( e n 1 ) , S is a dominating set for J ( G ) . The vertex e 1 S can be replaced by the vertex e 3 so that the set ( S { e 1 } ) { e 3 } is a dominating set of J ( G ) . The vertex e n 1 S can be replaced by e 2 , since the vertex { e 2 } N ( e n 1 ) , and the set ( S { e n 1 }) ∪ { e 2 } is a dominating set.
Thus, the set S = { e 1 , e n 1 } is a CSDS of J ( G ) with cardinality 2. This is the minimum CSDS because removing a vertex from S disrupts the dominating property of the graph. Hence, γ c s ( J ( G ) ) = 2 .
Case (ii): For any tree T with d i a m ( T ) 3 .
Let u i e i u j e j , u k e k u k + 1 be a path of maximum length in the tree T with pendant vertices u i and u k + 1 whose supporting edges are e i and e k , respectively. The edges of T are the vertices in J ( T ) and the total number of vertices in J ( T ) = n 1 . Consider the set S = { e i , e k } V ( J ( T ) ) . Since N [ e i ] N [ e k ] = ϕ , in L ( G ) , by definition of jump graphs, e i N [ e k ] and e k N [ e i ] . Thus, N [ S ] = V . Hence, S is a DS of J ( G ) and | N [ S ] | 2 . There exists a vertex e j N [ e k ] so that E P N [ e i , S ] N [ e k ] . Thus, the vertex e j replaces the vertex e i S . S is a CSDS since E P N [ e i , S ] N [ e j ] , and e j ( V ( J ( T ) ) S ) . Thus, | S | 2 .
Similarly, E P N [ e k , S ] N [ e k 2 ] , where the vertex e k 2 ( V ( J ( T ) ) S ) . Thus e k 2 replaces e k in S. Since a single vertex in S cannot dominate all vertices in J ( G ) , the minimum cardinality is at least two. Thus, | S | 2 . Thus, γ c s ( J ( T ) ) = 2 , by the above arguments.
Case (iii): Suppose G is an Eulerian graph, n 3 .
By definition, if G is an Eulerian graph, the graph possesses a closed trail that traverses each edge exactly once. The trail is a closed path with a diameter greater than 3 for n 4 . Hence, as proved in Case (i) of this theorem, γ c s ( J ( G ) ) = 2 .  □
The following theorem identifies specific graph classes in which γ c s ( J ( G ) ) = 2 = γ J ( G ) .
Figure 2 illustrates the cartesian product (c) P 3 K 4 of the graphs (a) P 3 and (b) K 4 .
Theorem 3.
γ c s ( J ( G ) ) = γ ( J ( G ) ) = 2 if G is belonging to any one of the following graph families:
(i) 
The cartesian product of graphs— P m P n , C m C n , C n P m , C n K n .
(ii) 
Windmill graph.
(iii) 
Barbell graph.
Proof. 
(i)
Consider the graph G H , where G = P m or C m or C n and H = P n or C n or P m or K n .
We know that the Cartesian product of P m and P n is the grid graph P m P n , m , n N , and N is the set of all natural numbers. We take G 1 = P m P n . By definition of the Cartesian product of graphs, G 1 has m n vertices and ( m 1 ) n + ( n 1 ) m edges. Thus the J ( G 1 ) has 2 m n ( m + n ) vertices. The edges in G 1 can be e 1 , e 2 , e 3 , , e m n 1 , f 1 , f 2 , f 3 , , f m n 1 , where E ( P m ) = { e 1 , e 2 , e 3 , , e m n 1 } and E ( P n ) = { f 1 , f 2 , f 3 , , f m n 1 } respectively. Choose a subset S 1 = { e 1 , e m } of V ( J ( G 1 ) ) , where e 1 N ( e m ) . S 1 dominates all the vertices of J ( G 1 ) . The vertex e 1 S 1 can be replaced by e 3 N ( e 1 ) . Also, the vertex e m n V ( J ( G 1 ) ) can be replaced by the vertex e m n 2 J ( G 1 ) in N ( e m n 1 ) . Thus, S 1 is a CSDS and its cardinality is 2. It is a minimum dominating set since a single vertex cannot dominate J ( G 1 ) . Hence, γ c s J ( G ) = γ J ( G ) = 2 .
A similar proof can be applied to the graph G 2 = C m C n , m , n 3 . Let the edges in G 2 be g 1 , g 2 , g 3 , , g m n , h 1 , h 2 , h 3 , , h m n respectively, where E ( C m ) = { g 1 , g 2 , g 3 , , g m n 1 } and E ( C n ) = { h 1 , h 2 , h 3 , , h m n 1 } . It is obvious that the set S 2 = { h 1 , h m n 1 } V ( J ( G ) ) is a DS of V ( J ( G 2 ) ) and | S 2 | 2 . The vertex h 1 V ( J ( G 2 ) ) can be replaced by the vertex g m n V ( J ( G 2 ) ) . Similarly, h m n S 2 can be replaced by h 2 V ( J ( G 2 ) ) . Removing a single vertex from S 2 will violate the definition of the dominating set of S 2 . Hence | S 2 | = 2 .
Thus, S 2 can be a DS as well as CSDS with cardinality two.
Similarly, using the above arguments, we can prove that
γ c s J ( G 3 ) = γ c s J ( C m P n ) and γ c s J ( ( G 4 ) ) = γ c s ( J ( C m P n ) ) = 2 , m , n 3 .
(ii)
Windmill graph.
Consider a windmill graph G = W d [ n , m ] , where n 4 , m 2 . Because all the complete graphs share this universal vertex, the domination number of the windmill graph is γ ( W d [ n , m ] ) = 1 . The bold vertex in Figure 3 shows this.
Now, consider the jump graph of the windmill graph. Choose any two non-adjacent edges, excluding the edges incident with the universal vertex, to form a DS S 3 = { e 1 , e 2 } . Every vertex in J ( G ) is dominated by S 3 . Any non-adjacent edge in ( W d [ n , m ] ) may replace the vertex e 1 in J ( ( W d [ n , m ] ) ) , with the exception of the edges incident with the universal vertex in ( W d [ n , m ] ) . In the same way, any non-adjacent edge in ( W d [ n , m ] ) that is not incident with the edge e 2 can be used to substitute the vertex e 2 J ( ( W d [ n , m ] ) ) . This set has cardinality two, making it a CSDS. Furthermore, the required condition for DS is violated when one vertex is removed from S 3 . Therefore, γ c s ( J ( G ) ) = 2 = γ ( J ( G ) ) .
(iii)
Barbell graph.
We know that in a complete graph with n vertices, γ ( G ) = γ c s ( G ) = 1 . Since two complete graphs are connected by a bridge, two end vertices of the bridge can be taken into the set S 4 = { u , v } , which is clearly a DS. The vertices u and v can be replaced by any x or y K 1 and K 2 , and hence S 4 is CSDS and hence γ c s ( G ) = γ ( G ) = 2 . Create a set S 6 = { e 1 , e 2 } by taking two edges that are non-incident with the bridge e = u v , where e 1 E ( K 1 ) and e 2 E ( K 2 ) . The edge e 1 is adjacent to all edges of K 2 and e 2 is adjacent to all edges of K 1 in J ( G ) because every edge in a complete graph is adjacent to every other edge. One of the DS of J ( G ) can be taken as S 6 . The vertex e 1 V ( J ( G ) ) can be replaced by any edge of K 1 that is not incident with the bridge e = u   v , and the vertex e 2 can be replaced by any edge of K 2 that is not incident with the bridge e = u   v , where u K 1 and v K 2 . | S 6 | = 2 because removing a single vertex from the set would violate the condition of a dominating set. Hence, γ c s ( J ( G ) ) = γ ( J ( G ) ) = 2 , as a result.
Figure 4 shows an illustration in which a Barbel graph and is its jump graph are given. The edges of the given graph (left figure) become the vertices in the jump graph (right figure) and the edge e 1 in the graph is a vertex that is adjacent to e 3 and e 6 in J ( G ) . The dominating vertices in the graph G and its jump graph are marked with bold vertices. □
Based on our analysis, it can be demonstrated that for any graph G from the family shown in the Figure 5, we have γ ( J ( G ) ) = γ c s ( J ( G ) ) = 2 . These graphs have a minimum degree δ ( G ) 2 and satisfy γ ( G ) = γ c s ( G ) = 3 .
Corollary 2.
If G { P n , C n , K n } with n 5 , then γ c s ( J ( G K m ) ) = γ ( J ( G K m ) ) = 2 .
Muddebihal and Kulli introduced the concept of lict graphs in [16]. Lict graphs are the middle graphs of path graphs with n 4 [17]. Lict graphs and their corresponding jump graphs were examined for their CSDN. The lict graph is illustrated in Figure 6.
Theorem 4.
For a connected lict graph L ( P n ) with n 4 and δ ( L ( P n ) 2 , then γ ( J ( L ( P n ) ) = γ c s ( J ( L ( P n ) ) = 2 .
Proof. 
Consider the given graph as a lict graph L ( P n ) which is the middle graph of the path graph P n , n 4 . By definition, L ( P n ) consists of 2 n 1 vertices and 3 ( n 1 ) edges. The vertex set of L ( P n ) be V L = { u 1 , u 2 , u 3 , , u n , u 1 , u 2 , u 3 , , u ( n 1 ) } . Consider the sets S L V L , where S L is defined as S L = { u 1 , u 3 , u 5 , , u n } , if n is odd and S L = { u 1 , u 3 , u 5 , , u n 1 } , if n is even. The set S L is a dominating set of L ( P n ) , since every vertex in ( V L S L ) N ( S L ) . | S L | n 2 n 3 + 1 . Every third vertex in the path graph P n is in the DS S L . The vertex u i S L can be replaced by u i { V L S L } for i = 1 , 2 , 3 , . , n , so that the new set ( { S L { u i } ) u i } is a DS. Thus, S L is a CSDS. | S L | = n 3 + 1 , and by removing a single vertex from the set, S L is no longer a DS.
Hence, CSDN of lict graph γ c s ( L ( P n ) ) = n 3 + 1 .
Now, consider the jump graph of lict graphs. For all lict graphs L ( P n ) , n 4 , the d i a m ( L ( P n ) ) > 3 and hence, by Theorem 3, γ ( J ( L ( P n ) ) = γ c s ( J ( L ( P n ) ) = 2 .  □

Generalisation of CSDN of Jump Graphs

The following theorem provides a generalization of the CSDN for the jump graphs of all connected graphs with a maximum degree Δ ( G ) 2 and circumference c ( G ) 4 .
Theorem 5.
For any connected graph G, with Δ ( G ) 2 and c ( G ) 4 , 2 γ c s ( J ( G ) ) 4 .
Proof. 
It is obvious that γ c s ( J ( G ) ) 2 for all connected graphs with δ ( G ) 2 . We divide the graph families based on the diameter.
Case 1:
d i a m ( G ) = 1 , c ( G ) 4 .
In this class of graphs, since d i a m ( G ) = 1 , every vertex in G is adjacent to every other vertex. Since c ( G ) 4 , at least two edges in G are non adjacent. Hence, γ c s ( J ( G ) ) 2 , for n 4 . This can be illustrated by taking the cases of any complete graph K 4 . It is clear that γ c s ( J ( K 4 ) ) = 3 . Thus, 2 γ c s ( J ( G ) ) ) 4 .
Case 2:
d i a m ( G ) = 2 , γ ( G ) = 1 , and c ( G ) > 4 .
Case 2 (i):
Graphs without pendant vertices.
Clearly, the DS of G will contain u, the vertex with the maximum degree. Take any edge e 1 = v 1 v 2 to the DS of J ( G ) , provided the edge e 1 is not incident with the vertex u. Since γ ( G ) = 1 , the edge e 1 is adjacent to all edges in G except the edges that are incident to e 1 in G. Let e 2 dominate all the edges incident to e 1 in G. The set S G = { e 1 , e 2 } V ( J ( G ) ) is a DS. It is possible to replace e 1 J ( G ) by the vertex e 3 , where e 3 is incident at the vertex u G . But the set { e 3 , e 2 } cannot dominate all vertices in J ( G ) . Hence, S 1 ( G ) = { e 1 , e 2 , e 4 } , where e 4 dominates all the edges incident on the vertex u of G. Thus, | S 1 ( G ) | 4 .
Case 2 (ii):
Graphs with pendant vertices.
Here, we consider the vertex with a maximum degree in G. Those edges in G that are not incident to the vertex with a maximum degree can enter the DS of J ( G ) . We consider graphs with a single pendant vertex because an increase in the number of pendant edges increases the d i a m ( G ) . As the c ( G ) increases, since γ ( G ) = 1 , the number of non-incident vertices with a maximum degree vertex is equal to the edges in c ( G ) 2 + no. of pendant edges in G. The maximum value of DN and CSDN is 4.
Case 3:
Graphs with d i a m ( G ) = 3 .
In this case, we consider the graphs without pendant vertices and with pendant vertices.
Case 3 (i):
Graphs without pendant vertices.
Here, non-adjacent edges to the maximum degree vertex have to be considered. At least three vertices are needed to form a CSDS. Thus, the maximum value of CSDN of J ( G ) is 4.
Case 3 (ii):
Graphs with pendant vertices.
In this case, we consider the edges not adjacent or incident to the vertex with a maximum degree in G, including the pendant edges as well. Since d i a m ( G ) = 3 , we can choose at least 3 edges from these sets to dominate J ( G ) . Consequently, the co-secure domination number is at most 4 .
Case 4:
Graphs with d i a m ( G ) > 3 .
In this case as well, we examine both graphs with and without pendant vertices.
Case 4 (i):
Graphs with d i a m ( G ) > 3 , without pendant vertices.
If G has d i a m ( G ) > 3 , the Theorem 4 provides a thorough explanation that for all connected graphs without pendant vertices, γ c s ( J ( G ) ) = 2 .
Case 4 (ii):
Graphs that have d i a m ( G ) > 3 with pendant vertices.
Consider the helm graph containing 4 pendant vertices, where c ( G ) > 4 . Here, the domination number, γ ( G ) , and the CSDN, γ c s ( G ) , are 4 and 5, respectively. The pendant edges connected to the principle diagonal edges can be included in the DS of J ( G ) , leading to γ ( J ( G ) ) = 2 . The CSDN becomes 2 . As both the diameter d i a m ( G ) and circumference c ( G ) increase, it is observed that γ c s ( J ( G ) ) = 2 .
Example: Consider the Helm graph with diameter 4 3 and pendant vertices in the Figure 7. The jump graph of the same graph is plotted in Figure 8. The dominating vertices are S H = { e 1 , e 7 } , since all other vertices in J ( G ) are in N ( S H ) .
The pendant vertices will surely enter the DS, and the central vertex will dominate all the other vertices. Thus γ ( G ) = 5 . All the pendant vertices and the central vertex can be replaced with the supporting vertex, and hence CSDN = 5. When we take the jump graph, since the diameter of the graph is 3 , by Theorem 2, γ c s ( J ( G ) ) = 2 .
Corollary 3.
For all graphs G, where G is connected, γ c s ( J ( G ) ) Δ j , where Δ j is the maximum degree of a vertex in J ( G ) .
Corollary 4.
If four pendant edges are attached to any of the closed graphs say, cycle graph C 4 , complete graph K 4 , or wheel graph W 4 , then the jump graphs of these graphs have, γ c s ( J ( G ) ) = 3 .
Theorem 6.
For graphs G with pendant vertices, k 4 and circumference c ( G ) 4 , γ c s ( J ( G ) ) γ c s ( G ) 1 .
Proof. 
Consider a connected graph G with k pendant vertices and circumference c ( G ) 5 . It is true that γ c s ( G ) k [5]. Choose a subset S j = { e i , e j } V ( J ( G ) ) , where { e i , e j } are two pendant edges of G that do not share a common edge. Clearly, this set dominates all the vertices of J ( G ) . Since the two pendant edges of G do not share a common edge and c ( G ) 4 , each vertex in S j can be replaced by another pendant edge in G, which is in the N ( e i ) V ( J ( G ) ) , and hence γ c s ( J ( G ) ) 2 . By theorem 6 , it is clear that 2 γ c s ( J ( G ) ) 4 . Thus, γ c s ( J ( G ) ) γ c s ( G ) 1 , because k > 4 and γ c s ( G ) k , and γ c s ( J ( G ) ) γ c s ( G ) , when k = 4 . □
We consider the jump graph of Sunlet graphs and Helm graphs [18]. These graphs show γ ( G ) = γ c s ( G ) = n and γ ( J ( G ) ) = γ c s ( J ( G ) ) = 2 . Analysing the jump graphs of these two graphs for the co-secure domination number, we obtain γ c s ( J ( G ) ) γ c s ( G ) 1 . The result is demonstrated in following figure. The sunlet graph shown in Figure 9 and its jump graph is given in Figure 10. We can see that for a sunlet graph G in the Figure 9, the black vertices are the dominating vertices as well as co-secure dominating vertices. Hence, γ ( G ) = γ c s ( G ) = 5 . The jump graph in the Figure 9 clearly explains γ ( J ( G ) ) = γ c s ( J ( G ) ) = 2 , where the CSDS of J ( G ) is { 1 , 8 } .

4. Conclusions

This paper examines γ c s ( J ( G ) ) across various graph classes and its relationship with other graph parameters. We provide exact values of γ c s ( J ( G ) ) for certain standard graphs and characterize jump graphs with γ c s ( J ( G ) ) = 2 . Additionally, we establish a tight bond on γ c s ( J ( G ) ) , particularly for jump graphs derived from other graphs and those with pendant vertices under specified conditions. This method has significant applications in analyzing and implementing security strategies within interconnection networks. In the domain of cyber-security, co-secure domination involves identifying critical nodes where guards should be stationed to maintain network stability. If a guard is compromised or needs to be relocated, another guard must immediately replace them to ensure continuous security. This approach is crucial for protecting network security against attacks or failures. By applying these mathematical concepts, cyber-security professionals can develop more effective defense systems to safeguard critical network infrastructure.

Author Contributions

Conceptualization, M.P., R.R.I. and K.S.; methodology, M.P. and R.R.I.; resources, M.P. and K.S.; writing—original draft preparation, M.P. and R.R.I.; writing—review and editing, M.P., R.R.I., K.S. and A.A.; funding acquisition, A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by King Khalid University, project under grant number RGP.2/372/45.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The authors thank the reviewers for their valuable suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hsu, L.-H.; Lin, C.-K. Graph Theory and Interconnection Networks; CRC Press: Boca Raton, FL, USA, 2008. [Google Scholar]
  2. Widmayer, P.; Neyer, G.; Eidenbenz, S. (Eds.) Graph-Theoretic Concepts in Computer Science. In Proceedings of the 25th International Workshop, WG’99, Ascona, Switzerland, 17–19 June 1999; Springer: Berlin/Heidelberg, Germany, 2003. [Google Scholar]
  3. Haynes, T.W.; Hedetniemi, S.; Slater, P. Fundamentals of Domination in Graphs; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
  4. Cockayne, E.J.; Grobler, P.J.P.; Grundlingh, W.R.; Munganga, J.; Van Vuuren, J.H. Protection of a graph. Util. Math. 2005, 67, 19–32. [Google Scholar]
  5. Arumugam, S.; Ebadi, K.; Manrique, M. Co-secure and secure domination in graphs. Util. Math. 2014, 94, 167–182. [Google Scholar]
  6. Klostermeyer, W.F.; Mynhardt, C.M. Protecting a graph with mobile guards. Appl. Anal. Discret. Math. 2016, 10, 1–29. [Google Scholar] [CrossRef]
  7. Manjusha, P.; Chithra, M.R. Co-secure domination in Mycielski graphs. J. Comb. Math. Comb. Comput. 2020, 113, 289–297. [Google Scholar]
  8. Nayana, P.G.; Iyer, R.R. On secure domination number of generalized Mycielskian of some graphs. J. Intell. Fuzzy Syst. Prepr. 2023, 44, 1–11. [Google Scholar] [CrossRef]
  9. Manjusha, P.; Iyer, R.R. Application of Co-Secure Domination in Sierpinski Networks. In Proceedings of the 2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS), Bangalore, India, 4–5 November 2022. [Google Scholar]
  10. Basavanagoud, B.; Mathad, V. Graph equations for line graphs, jump graphs, middle graphs, splitting graphs and line splitting graphs. Mapana J. Sci. 2010, 9, 53–61. [Google Scholar] [CrossRef]
  11. Sastry, D.V.S.; Raju, B.S.P. Graph equations for line graphs, total graphs, middle graphs and quasi-total graphs. Discret. Math. 1984, 48, 113–119. [Google Scholar] [CrossRef]
  12. Venkatachalapathy, M.; Kokila, K.; Abarna, B. Some trends in line graphs. Adv. Theor. Appl. Math. 2016, 11, 171–178. [Google Scholar]
  13. Chartrand, G.; Hevia, H.; Jarrett, E.B.; Schultz, M. Subgraph distances in graphs defined by edge transfers. Discret. Math. 1997, 170, 63–79. [Google Scholar] [CrossRef]
  14. Maralabhavi, Y.B.; Anupama, S.B.; Goudar, V.M. Domination Number of JUMP Graph; Hikari Ltd.: Rousse, Bulgaria, 2013; Volume 8, pp. 753–758. [Google Scholar]
  15. Beineke, L.W.; Bagga, J.S. Line Graphs and Line Digraphs; Springer: Berlin/Heidelberg, Germany, 1990. [Google Scholar]
  16. Muddebihal, M.H.; Kulli, V.R. Lict and Litact graph of a graph. J. Anal. Comput. 2006, 3, 33–43. [Google Scholar]
  17. Basavanagoud, B.; Mathad, V.N. Graph equations for line graphs, jump graphs, middle graphs, litact graphs and lict graphs. Acta Cienc. Indica Math. 2005, 31, 735. [Google Scholar]
  18. Frucht, R. Graceful numbering of wheels and related graphs. Ann. N. Y. Acad. Sci. 1979, 319, 219–229. [Google Scholar] [CrossRef]
Figure 1. (left) Graph G. (right) Jump graph J ( G ) .
Figure 1. (left) Graph G. (right) Jump graph J ( G ) .
Mathematics 12 03077 g001
Figure 2. (a) P 3 (b) K 4 (c) P 3 K 4 .
Figure 2. (a) P 3 (b) K 4 (c) P 3 K 4 .
Mathematics 12 03077 g002
Figure 3. Windmill Graph with γ ( G ) = 1 .
Figure 3. Windmill Graph with γ ( G ) = 1 .
Mathematics 12 03077 g003
Figure 4. (left) Barbel Graph. (right) Jump graph of Barbel graph.
Figure 4. (left) Barbel Graph. (right) Jump graph of Barbel graph.
Mathematics 12 03077 g004
Figure 5. A family of graphs (ae) with γ ( J ( G ) ) = γ c s ( J ( G ) ) = 2 .
Figure 5. A family of graphs (ae) with γ ( J ( G ) ) = γ c s ( J ( G ) ) = 2 .
Mathematics 12 03077 g005
Figure 6. Lict graph.
Figure 6. Lict graph.
Mathematics 12 03077 g006
Figure 7. Helm graph.
Figure 7. Helm graph.
Mathematics 12 03077 g007
Figure 8. Jump graph of Helm graph.
Figure 8. Jump graph of Helm graph.
Mathematics 12 03077 g008
Figure 9. Sunlet graph, CSDN = 5.
Figure 9. Sunlet graph, CSDN = 5.
Mathematics 12 03077 g009
Figure 10. Sunlet jump graph, CSDN = DN = 2.
Figure 10. Sunlet jump graph, CSDN = DN = 2.
Mathematics 12 03077 g010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pothuvath, M.; Iyer, R.R.; Asiri, A.; Somasundaram, K. Co-Secure Domination in Jump Graphs for Enhanced Security. Mathematics 2024, 12, 3077. https://doi.org/10.3390/math12193077

AMA Style

Pothuvath M, Iyer RR, Asiri A, Somasundaram K. Co-Secure Domination in Jump Graphs for Enhanced Security. Mathematics. 2024; 12(19):3077. https://doi.org/10.3390/math12193077

Chicago/Turabian Style

Pothuvath, Manjusha, Radha Rajamani Iyer, Ahmad Asiri, and Kanagasabapathi Somasundaram. 2024. "Co-Secure Domination in Jump Graphs for Enhanced Security" Mathematics 12, no. 19: 3077. https://doi.org/10.3390/math12193077

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop