Skip to main content
Log in

Secure Restrained Domination in Graphs

  • Published:
Mathematics in Computer Science Aims and scope Submit manuscript

Abstract

Let G = (V, E) be a graph and let \({S \subseteq V}\). The set S is a dominating set of G if every vertex in \({V \backslash S}\) is adjacent to some vertex in S. The set S is a secure dominating set of G if for each \({u \in V \backslash S}\), there exists a vertex \({v \in S}\) such that \({uv \in E}\) and \({(S \backslash \{v\}) \cup \{u\}}\) is a dominating set of G. The set S is a restrained dominating set if every vertex in \({V \backslash S}\) is adjacent to a vertex in S and to a vertex in \({V \backslash S}\). A set \({S \subseteq V(G)}\) is called a secure restrained dominating set (SRDS) of G if S is restrained dominating and for all \({u \in V \backslash S}\) there exists \({v \in S \cap N(u)}\) such that \({(S \backslash \{v\}) \cup \{u\}}\) is restrained dominating. The minimum cardinality of a SRDS is called the secure restrained domination number of G and is denoted by \({\gamma_{sr}(G)}\). In this paper we study few properties of secure restrained domination number on certain classes of graphs and we evaluate \({\gamma_{sr}(G)}\) values for trees, unicyclic graphs, split graphs and generalized Petersen graphs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Burger A.P., Cockayne E.J., Grundlingh W.R., Mynhardt C.M., van Vuuren J.H., Winterbach W.: Finite order domination in graphs. J. Combin. Math. Combin. Comput. 49, 159–175 (2004)

    MATH  MathSciNet  Google Scholar 

  2. Burger A.P., Cockayne E.J., Grundlingh W.R., Mynhardt C.M., van Vuuren J.H., Winterbach W.: Infinite order domination in graphs. J. Combin. Math. Combin. Comput. 50, 179–194 (2004)

    MATH  MathSciNet  Google Scholar 

  3. Cockayne E.J.: Irredundance, secure domination and maximum degree in trees. Discrete Math. 307, 12–17 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  4. Cockayne E.J., Favaron O., Mynhardt C.M.: Secure domination, weak roman domination and forbidden subgraphs. Bull. Inst. Combin. Appl. 39, 87–100 (2003)

    MATH  MathSciNet  Google Scholar 

  5. Cockayne E.J., Grobler P.J.P., Grundlingh W., Munganga J., van Vuuren J.H.: Protection of a graph. Utilitas Math. 67, 19–32 (2005)

    MATH  Google Scholar 

  6. Domke G.S., Hattingh J.H., Hedetniemi S.T., Laskar R.S., Markus L.R.: Restrained domination in graphs. Discrete Math. 203, 61–69 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  7. Domke, G.S., Hattingh, J.H., Henning, M.A., Markus, L.R.: Restrained domination in trees. Discrete Math. 1–9 (2000)

  8. Harary F.: Graph theory. Addison-Wesley, Reading (1972)

    Google Scholar 

  9. Haynes T.W., Hedetniemi S.T., Slater P.J.: Domination in graphs: advanced topics. Marcel Dekker, New York (1998)

    MATH  Google Scholar 

  10. Haynes T.W., Hedetniemi S.T., Slater P.J.: Fundamentals of domination in graphs. Marcel Dekker, New York (1998)

    MATH  Google Scholar 

  11. Hattingh J.H., Joubert E.J.: Restrained domination in cubic graphs. J. Combin. Optim. 22(2), 166–179 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  12. Hattingh J.H., Joubert E.J., Loizeaux M., Plummer A.R., Vander Merwe L.: Restrained domination in unicyclic graphs. Discussiones Mathematicae Graph Theory 29(1), 71–86 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  13. Hattingh, J.H., Henning, M.A.: Restrained domination excellent trees. Ars. Combinatoria (2008)

  14. Mynhardt C.M., Swart H.C., Ungerer E.: Excellent trees and secure domination. Util. Math. 67, 255–267 (2005)

    MATH  MathSciNet  Google Scholar 

  15. Roushini Leely Pushpam, P., Chitra, S.: Secure restrained domination in graphs. In: Proceedings of the International Conference on Mathematical and Computer Engineering, Vellore Institute of Technology, Chennai Campus, pp. 344–349 (2013)

  16. Roushini Leely Pushpam, P., Chitra, S.: Further results on secure restrained domination in graphs. Accepted for publication in Journal of Discrete Mathematical Sciences and Cryptography

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Roushini Leely Pushpam.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pushpam, P.R.L., Suseendran, C. Secure Restrained Domination in Graphs. Math.Comput.Sci. 9, 239–247 (2015). https://doi.org/10.1007/s11786-015-0230-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11786-015-0230-4

Keywords

Mathematics Subject Classification

Navigation