Abstract

Let G = (V, E) be a connected, basic, and finite graph. A subset of V(G) is said to be a resolving set if for any y ∈ V(G), the code of y with regards to T, represented by , which is defined as , is different for various y. The dimension of G is the smallest cardinality of a resolving set and is denoted by dim(G). If, for any t  ∈  VS, there exists r ∈ S such that is a resolving set, then the resolving set S is secure. The secure metric dimension of 𝐺 is the cardinal number of the minimum secure resolving set. Determining the secure metric dimension of any given graph is an NP-complete problem. In addition, there are several uses for the metric dimension in a variety of fields, including image processing, pattern recognition, network discovery and verification, geographic routing protocols, and combinatorial optimization. In this paper, we determine the secure metric dimension of special graphs such as a globe graph , flag graph , H- graph of path , a bistar graph , and tadpole graph . Finally, we derive the explicit formulas for the secure metric dimension of tadpole graph , subdivision of tadpole graph , and subdivision of tadpole graph .

1. Introduction

Let be a connected, basic, finite graph. Let on which the ordering is imposed. The ordered k-tuples are referred to as the metric description of with regards to T for every . The set T is said to be a resolving set if r (u|T) is not equal to for any u, in . A minimum resolving set or basis is a resolving set of with minimum cardinality, and the cardinality of a minimum resolving set is referred to as the dimension of , which is indicated by dim() [1].

In the literature, the concept of finding sets in a connected network has already been discussed [2, 3]. Nearly forty years ago, Slater introduced the ideas of locating sets (also known as resolving sets) and a reference set (metric dimension). Later, the aforementioned theory was independently discovered by Harary and Melter [4]. Sebo and Tannier [5], Mohamed et al. [6], Amin et al. [7], and Borchert et al. [8] have all conducted different research on the idea of the metric dimension of graphs. Meanwhile, Imran et al. [9] studied the metric dimension of the generalized Petersen multigraphs P(2n, n), which are the barycentric subdivision of Möbius ladders and established that they have metric dimensions of 3 and when n is even and 4 when n is odd. Jäger et al. [10] showed that the metric dimension of , n ≥ 2 is ⌊⌋. The complement metric dimension and specifics of particular graphs were studied by Susilowati et al. [11]. The dominant metric dimension of the joint product graphs was investigated by Purwati et al. [12]. The metric dimension of corona product graphs was discovered by Iswadi et al. [13]. In certain networks, including the trapezoid network, the network, the open ladder network, the tortoise network, and the network, Mohamed et al. [14] studied the exact value of the secure resolving set. The exact values of the local metric basis and local metric dimension of the cyclic split graph were examined by Cynthia et al. [15]. Grigorious et al. [16] identified the metric dimension for all n-values of the circulant graphs C(n, ±{1, 2, 3, 4}). The metric dimension of the family of generalized wheels was established by Sooryanarayana et al. [17]. Several different kinds of sets in a graph are related to the concept of security. For instance, a secure set is a dominating set D of G if for all , there exists u ∈ D such that is a dominating set [4, 18]. The secure resolving set for various classes of graphs was identified by Subramanian et al. [19]. Numerous graph operations, such as corona product graphs [13], comb product graphs [20], and joint product graphs [21], have been found to have a metric dimension. Metric dimension has been used in many different applications, including robot navigation in networks [2225], pharmaceutical chemistry Chartrand et al. [1], pattern recognition Melter et al. [26], and localization of wireless sensor networks [27].

The secure metric dimension for various graphs, including the globe graph , the flag graph , the H-graph of the path , the bistar graph , and tadpole graph is determined in this paper. The secure metric dimension of the tadpole graphs , the subdivision of the tadpole graph , and the subdivision of the tadpole graph are finally derived explicitly.

2. Preliminary Notes

Definition 1. (see [28]). Tadpole graph is a special type of graph that consists of a bridge connecting a cycle graph with n (at least 3) vertices and a path graph with m vertices.

Definition 2. (see [29]). A globe graph is a graph obtained from two isolated vertex connected by n paths of length two.

Definition 3. (see [29, 30]). A bistar graph also known as , is the graph created by connecting the centre (apex) vertices of two copies of by an edge and it is denoted by . The vertex set of is given by , where and are apex vertices and are pendent vertices. The edge set of is .

3. Secure Metric Dimension

Definition 4. If a subset T of is resolving and there is a y ∈ T such that is a resolving set of for any xT, then the subset T is an SR set of . The secure resolving dimension of , denoted by sdim(), is the least cardinality of an SR set of .

The notion of metric dimension, which was first presented separately by Subramanian [19] and Mohamed [14]. Robot navigation in a network represented by a graph is one of the main motivating factors behind its study (see [31]).

The robot uses “landmarks,” or transmitters, set at sites (the graph’s vertices) to establish its location inside the network; so, the metric dimension and the secure metric dimension are the bare minimum of transmitters needed for the robot to always be aware of its position inside the network that the graph represents. The metric dimension of a graph is an NP-hard problem, as was mentioned in [32]. Furthermore, business networks, chemical structures, wireless communication networks, and electrical networks [3344] all make use of secure metric dimension theory.

Remark 5. There is a guarantee that an SR set exists. Because the vertex set in any graph is both a resolving set and a secure set.

Remark 6. dim() ≤ sdim().

3.1. Secure Metric Dimension for Several Certain Graphs [19]
(1)sdim (2)sdim (3)sdim (4)sdim (5)

4. Main Results

Here, we demonstrate that the secure metric dimension of the globe graph , flag graph , H- graph of path , and the bistar graph . We also derive the explicit formulas for the secure metric dimension of tadpole graph , tadpole graph , subdivision of tadpole graph , and subdivision of tadpole graph .

Theorem 7. Let is a globe graph with k blocks and n vertices, then sdim.

Proof. We label the globe graph as shown in Figure 1. We choose a subset , and we must demonstrate that sdim . The following is how we obtained the representations of the vertices in the graph with respect to S.The vertices of graph have distinct representations when viewed from above. Although it implies that S is a secure resolving set, this does not imply that it is the lower bound. is the upper bound as a result. For the globe graph , there is no secure resolving set whose cardinality is 1. is the lower bound and as a result obtained that and ; therefore, . From the aforementioned proof, we deduce that .

Theorem 8. Let be a flag graph with n vertices, then sdim.

Proof. We label the flag graph as shown in Figure 2. It is obvious that there are n vertices. In order to have two cases in the proof, let if n is odd and if n is even.

Case 9. n is odd. Let  ⸦  be a secure resolving set. The representations of the vertices of with regards to S are the following:

Case 10. n is even. Let  ⸦  be a secure resolving set. The representations of the vertices of with regards to S are the following:This completes the proof.
Since it is obvious that no two vertices have the same labeling, we obtain a secure resolving set S with |S|, and as a result, we obtain sdim.

Theorem 11. Let be a H- graph of path with n vertices, then sdim() = 2.

Proof. We label the H- graph of path as shown in Figure 3. Let S= {, } such that n is the vertices number. We want to show that for all to demonstrate that S is a secure resolving set. Observe the following:Case 1. For n= 4, then sdim() = 1.Case 2. For n= 6, then sdim() = 2 and {} be a secure metric basis of .Case 3. For n= 8, 10, 12, …, n then sdim() = 2 and be a secure metric basis of .Beginfor (i = 1; i ; i++) dod(, S) = endfor (i = ; i ; i++) doendfor (i = ; i ; i++) do  d(, S) = endfor (i = ; i ; i++) do  d(, S) = endendThis completes the proof.
Since it is obvious that no two vertices have the same labeling, we obtain a secure resolving set S with |S|, and as a result, sdim () = 2. Four for-loops are present in the algorithm used to prove Theorem 11, but they are not inner loops, hence the complexity of the algorithm is O(n), indicating that it is a polynomial time algorithm.

Theorem 12. Let be tadpole graph with m vertices, and {} be a secure metric basis of G, then sdim () = 2.

Proof. We label the tadpole graph as shown in Figure 4. We choose a subset S= {}, and we must show that sdim() = 2 for n 4. The following is how we obtained the representations of the vertices in the graph with respect to S.Obviously, there are no two vertices with the same labeling; we then get a secure resolving set S with |S|, so we have sdim () = 2.

Corollary 13. Let G be tadpole graph with n and m vertices and {} be a secure metric basis of G, then sdim () = 2.

Corollary 14. Let G be subdivision of tadpole graph with m vertices and {} be a secure metric basis of , then sdim  = 2.

Corollary 15. Let be subdivision of tadpole graph with n, m vertices and {} be a secure metric basis of , then sdim  = 2.

Theorem 16. Let be the bistar graph with n vertices and {} be a secure metric basis of G, then sdim () = n-2.

Proof. We label the bistar graph as shown in Figure 5. We choose a subset S= {}, and we must show that sdim () = n-2 for n 6. The following is how we obtained the representations of the vertices in the graph with respect to S.From above, the representations of vertices in graph are distinct. This implies that S is a secure resolving set, but it is not necessarily the lower bound. Thus, the upper bound is sdim() ≤ . For there is no secue resolving set that the cardinality is one. Thus, the lower bound is sdim() ≥  and we obtained that sdim() ≤  and sdim() ≥ ; therefore, sdim() = . From the above proving, we conclude that sdim() = .

5. Conclusion

The secure metric dimensions of the globe graph and the bistar graph have the same secure metric dimensions . The flag graph H- graph of path , bistar graph, tadpole graph , , and subdivision of tadpole graph have the same constant secure metric dimension 2.

6. Future Work

In the future, we plan to determine the secure metric dimension of many graphs, such as subdivisions of crown graphs, cocktail party graphs, triangular pyramid graph , and square pyramid graph .

Data Availability

No data were used to support the findings of this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

The author would like to thank Deanship of Scientific Research at Majmaah University for supporting this work under project number: R-2024-1050.