1 secure and secure-dominating set of cartesian product graphs kai-ping huang and justie su-tzu juan...

37
1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering National Chi-Nan University

Upload: alexus-nice

Post on 14-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

1

Secure and Secure-dominating Set of Cartesian Product Graphs

Kai-Ping Huang and Justie Su-Tzu Juan

Department of Computer Science and Information Engineering

National Chi-Nan University

Page 2: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

22

Outline

• Introduction– Secure set– Secure-dominating set

• Secure set– Preliminary– Main result

• Secure-dominating set– Preliminary– Main result

• Conclusions

Page 3: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

3

N(v)

Introduction

Def:Let G = (V, E) be a graph. If v V and S ⊆ V :

1. N(v) ={u V : vu E}.2. N[v]= N(v) {∪ v}.3. N(S) =∪vSN(v).4. N[S]= N(S) ∪ S.

N[S]

S

v

Page 4: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

4

Introduction

Def:

5. A : S → Ƥ (V(G) − S) is called an attack on S (in G) if A(u) ⊆ N(u) − S for all u S and A(u) ∩ A(v) = ∅ for all u, v S, u v.

6. D : S → Ƥ (S) is called a defense of S if D(u) ⊆ N[u] ∩ S for all u S and D(u) ∩ D(v) = for all ∅ u, v S, u v.

G Su

v1

2

3

A(u) ={1, 2}A(v) ={3}D(u) ={u}D(v) ={v}

D(u) = {u, v}D(v) = ∅

4

A(u) = {2}A(v) = {1, 3}

Page 5: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

Gu

v1

2

3

5

Introduction

Def:

7. secure set : All attack A on S, there exists a defense of S corresponding to A.

8. s(G) = min{|S| : S is a secure set of G}.

S

Page 6: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

6

IntroductionG S

Def:

9. Dominating set : G if N[S] = V(G).

10. Secure-dominating set : S is a secure set of G that is also a dominating set of G.

11. γs(G) = min{|S| : S is a secure-dominating set of G}.

Page 7: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

7

Introduction

General graph G

Pn Pm × Pn Km

Pn1 Pn2

… Pnk

Km1 Km2

… Kmk

Secure set Brigham et al, 2007 [1]

The thesisSecure-dominating

setChang et al, 2008 [2]

[1] R. C. Brigham, R. D. Dutton, S. T. Hedetniemi, “Security in graphs,” Discrete Appl. Math., 155 (2007), 1708-1714.

[2] Chia-Lang Chang, Tsui-Ping Chang, David Kuo, “Secure and secure-dominating set of graphs,” National Dong Hwa University Applied Mathematics, Manuscript.

Page 8: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

8

Secure set - Preliminary

• Proposition 1. [1] If S is a secure set of G, then for each v in S, |N[v] ∩ S| ≥ |N(v) − S|.

• Corollary 2. [1]

If S1 and S2 are vertex disjoint secure sets in the same graph, then S1 ∪ S2 is a secure set.

Page 9: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

9

Secure set - Preliminary

• Proposition 3. [1]

s(Pm × Pn) = min{m, n, 3}.

P3 × P2 P5 × P5

s(G) = 2 s(G) =3

Page 10: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

Secure set - Main result

• Theorem 4.

1 < n1 n2 … nk1 nk

1. When n1 = n2 =2,

s(Pn1 P n2

… Pnk) 4n3 … nk2

2. When 2 < n2,

s(Pn1 P n2

… Pnk) 3n1 n2 … nk2

10

Page 11: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

11

Secure set - Main result

• s(Pn1 × Pn2 × Pn3), n1 n2 n3

P2 × P2 × P2 P2 × P3 × P3 P3 × P3 × P3

P2 × P2 × P3 P2 × P3 × P4 P3 × P3 × P4

… …

Page 12: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

12

Secure set - Main result

• s(Pn1 × Pn2 × Pn3

), n1 n2 n3

G = P4 × Pn2 × Pn3 , s(G) 12

G = P5 × Pn2 × Pn3 , s(G) 15

G = Pn1 × Pn2 × Pn3, s(G) 3n1

Page 13: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

13

Secure set - Main result

• Lemma 5.

1. When n1 = n2 =2, s(Pn1 Pn2

Pn3) 4

2. When 2 < n2, s(Pn1 Pn2

Pn3) 3n1

Pn1 Pn2

… Pnk = (Pn1

Pn2 … Pnk2

) Pnk1 Pnk

1. When n1 = n2 =2,

s(Pn1 P n2

… Pnk) 4n3 … nk2

2. When 2 < n2,

s(Pn1 P n2

… Pnk) 3n1 n2 … nk2

Page 14: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

14

Secure set - Main result

• Theorem 6. [1]

s(Km) =

2

m

K4

K7

Page 15: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

15

Secure set - Main result

• Theorem 7.

1.When mk1 is even,

2.When mk1 is odd,

• Km1 K m2

… Kmk1 Kmk

= (Km1 K m2

… Kmk1) Kmk

2

...... 21

21

kmmm

mmmKKKs

k

k

k

kkmmm m

m

mmmmKKKs

k 32

1......

1

21

22121

Page 16: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

16

Secure set - Main result

• Km1 K m2

if m1 odd

even

Km1

Km2

21m

21m

l

m2 − l

211

1

222

2m

mm

m

l

lmm

lm

lm

2111

222

21

1

3

1m

m

ml

2ml

a b

c

Page 17: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

17

Secure set - Main result

• Lemma 8.

1.When m1 is even,

2.When m1 is odd,

Km1 K m2

… Kmk1 Kmk

= (Km1 K m2

… Kmk1) Kmk

1.When mk1 is even,

2.When mk1 is odd,

2

2121

mmKKs mm

2

1

21

32

121

mm

mKKs mm

2

...... 21

21

kmmm

mmmKKKs

k

k

k

kkmmm m

m

mmmmKKKs

k 32

1......

1

21

22121

Page 18: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

18

Secure-dominating set - Preliminary

• Theorem 9. [2]For any graph G with |V(G)| = n, γs(G) ≥ n/2.

• Theorem 10. [2]

For all n ≥ 2, γs(Pn) = n/2.

• Corollary 11. [2]

1. γs(G × Pn) ≤ n/2 |V(G)|.2. When n is even :

① γs(G × Pn) = n/2 |V(G)|.

② V(Pn) = {v1,v2, ··· ,vn} , S = {(u, vi): u ∈ V(G), i ≡ 2, 3 (mod 4)} is a secure-dominating set.

P5 × P8

Page 19: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

19

Secure-dominating set - Preliminary• Lemma 12. [2]

For all n ≥ 1, S = {(2, j):1 ≤ j ≤ n} {(3, ∪ j):1 ≤ j ≤ n,

j ≡ 1(mod 2)} is a secure-dominating set of P3 × Pn.

• Lemma 13. [2]

For all n ≥ 1, S = {(i, j): i = 2, 4, 1 ≤ j ≤ n} {(3, ∪ j):1 ≤ j ≤ n,

j ≡ 1(mod 2)} is a secure-dominating set of P5 × Pn.

• Theorem 14. [2]

For all m, n ≥ 2, γs(Pm × Pn) = mn/2. P3 × P7

P7 × P7 (P3 P4) × P7

Page 20: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

20

Secure-dominating set - Preliminary

Def:

wA(v) = 1 − |A(v)| for all v ∈ S.

• Lemma 16. [2]

1. wA(v) {−1, 0, 1}.∈2. = k ≥ 1, 1 ≤ i ≤ k.

3. Vertex disjoint paths Pi, wA(vi,1) = 1,wA(vi,li ) = −1, and wA(vi,j ) = 0 for all i, j, 1 ≤ i ≤ k, 2 ≤ j ≤ li − 1.There exists a defense D of S corresponding to A.

)1(1 Aw

wA(v3) = 1

wA(v2) = 0wA(v1) = 1

Page 21: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

21

Secure-dominating set - Main result

• Theorem 17.

γs(Pn1 Pn2

… Pnk) =

2

...21 knnn

Page 22: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

22

Secure-dominating set - Main result

• P2 × P4 × P6 = P2 × G, G = P4 × P6, γs(P2 × P4 × P6) = 24

• P3 × P4 × P5 = P4 × G, G = P3 × P5, γs(P3 × P4 × P5) = 30

Page 23: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

• Pn1 Pn2

… Pnk = (Pn1

P n2 … Pnk1

) Pnk

If nk = 4l+1,

If nk = 4l+3,

Secure-dominating set - Main result

23

Pn1 P n2

… Pnk1

Pn1 P n2

… Pnk1

|S*(G)| = n1n2…nk/2

Page 24: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

Secure-dominating set - Main result

P3 × P5 × P7 × P9 × P11 × P13

= (P3 × P5 × P7 × P9 × P11 )× P13

24

P3 × P5 × P7 × P9 × P11

P3 × P5 × P7 × P9

P3 × P5 × P7

P3 × P5

|S*(G)| = (3 × 5 × 7 × 9 × 11 × 13)/2

Page 25: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

25

• Lemma 18.

In Pn1 Pn2

… Pnk, S* is selected as previous rules, for any

black super node R, there are at most four red super node Ri, 1 i 4, with wA(Ri) = 0, adjacet to R. If for all x R − S*, x A(u), for some u Ri. There exists a defense D of S* corresponding to A.

Secure-dominating set - Main result

S*(P5 P5 Pn)

Page 26: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

26

Secure-dominating set - Main result

• Proof :Pn1

Pn2 … Pnk

when n1, n2, …, nk are odd.

• Case 1

nk = 4l + 3 , nk1 = 4m + 3

• Case 2

nk = 4l + 3 , nk1 = 4m + 1

• Case 3

nk = 4l + 1 , nk1 = 4m + 3

• Case 4

nk = 4l + 1 , nk1 = 4m + 1

Page 27: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

27

Secure-dominating set - Main result

• Proof :S*(Pn1

Pn2) is secure

If S*(Pn1 Pn2

… Pnk-1) is secure

then S*(Pn1 Pn2

… Pnk) :

Page 28: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

• Proof :Case 1 : If nk = 4l+3, nk–1 = 4m+3

Secure-dominating set - Main result

……………

……

Page 29: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

• Proof :Case 1 :

Secure-dominating set - Main result

Page 30: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

30

Secure-dominating set - Main result

|S*(G)| = (n1 n2 … nk)/2

• Theorem 17.

γs(Pn1 Pn2

… Pnk) =

2

...21 knnn

Page 31: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

31

Secure-dominating set - Main result

• Theorem 19. [2]

2

mKsK mm

s

K4

K7

Page 32: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

32

Secure-dominating set - Main result

• Theorem 20.

γs(Km1 K m2

… Kmk1 Kmk

) =

2

...21 kmmm

Page 33: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

33

Secure-dominating set - Main result

• K2 K4 K6 = K2 (K4 K6)

• K3 K4 K5 K6 = K4 (K3 K5 K6)

K3 K5 K6

K3 K4 K5 K6

K6

K6K6

K6K6

K6K6

K6

K2 K4 K6

Page 34: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

34

Secure-dominating set - Main result

• Km1 K m2

… Kmk1 Kmk

= (Km1 K m2

… Kmk1) Kmk

Km1 K m2

… Kmk1 = (Km1

K m2 … Kmk2

) Kmk1

……

Km1 … Kmk

2

1km

K m1 … Kmk-1

2

11 km

Km1

2

1m

Page 35: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

35

Secure-dominating set - Main result

• K3 K5 K7 = (K3 K5) K7

K3 K5 K7 K3 K5 K3

|S*(G)| = (3 × 5 × 7)/2

Page 36: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

Secure-dominating set - Main result

• Proof :S*(Km1

) is secure

If S*(Km1 K m2

… Kmk1) is secure

then S*(Km1 K m2

… Kmk) :

36

Kmk ok

… …

Km1 K m2

… Kmk1

Km1 K m2

… Kmk1

Km1 K m2

… Kmk1

Page 37: 1 Secure and Secure-dominating Set of Cartesian Product Graphs Kai-Ping Huang and Justie Su-Tzu Juan Department of Computer Science and Information Engineering

37

Conclusions

General graph G G = Pn G = Pm × Pn G = Km

Secure set |V(G)| 2 min{m, n, 3}

Secure-dominating set

2

)(GV

2

)(GV

2

m

G = Pn1 Pn2

… PnkG = Km1

Km2 … Kmk

Secure set

When n1 = n2 = 2,s(G) 4n3 … nk-2

When 2 n2,s(G) 3n1 … nk-2

When mk-1 is even,s(G)

When mk-1 is odd,s(G)

Secure-dominating set

2

)(GV

2

)(GV

3

1

2

)(

11

21

kk

k

mm

mGV

The Results of Previous Scholar

Main Results