Skip to main content
Log in

Optimal bounds on codes for location in circulant graphs

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

Identifying and locating-dominating codes have been studied widely in circulant graphs of type \(C_{n}(1,2,3,\dots , r)\) over the recent years. In 2013, Ghebleh and Niepel studied locating-dominating and identifying codes in the circulant graphs \(C_{n}(1,d)\) for \(d = 3\) and proposed as an open question the case of \(d > 3\). In this paper we study identifying, locating-dominating and self-identifying codes in the graphs \(C_{n}(1,d)\), \(C_{n}(1,d-1,d)\) and \(C_{n}(1,d-1,d,d + 1)\). We give a new method to study lower bounds for these three codes in the circulant graphs using suitable grids. Moreover, we show that these bounds are attained for infinitely many parameters n and d. In addition, new approaches are provided which give the exact values for the optimal self-identifying codes in \(C_{n}(1,3)\) and \(C_{n}(1,4)\).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ben-Haim, Y., Litsyn, S.: Exact minimum density of codes identifying vertices in the square grid. SIAM J. Discret. Math. 19(1), 69–82 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  2. Bertrand, N., Charon, I., Hudry, O., Lobstein, A.: Identifying and locating-dominating codes on chains and cycles. Eur. J. Comb. 25(7), 969–987 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  3. Charon, I., Hudry, O., Lobstein, A.: Identifying codes with small radius in some infinite regular graphs. Electron. J. Combin. 9(1), Research Paper 11 (2002)

    MathSciNet  MATH  Google Scholar 

  4. Chen, C., Lu, C., Miao, Z.: Identifying codes and locating-dominating sets on paths and cycles. Discret. Appl. Math. 159(15), 1540–1547 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  5. Cohen, G., Gravier, S., Honkala, I., Lobstein, A., Mollard, M., Payan, C., Zémor, G.: Improved identifying codes for the grid. Electron. J. Combin. 6, Research Paper 19, Comment (1999)

    MathSciNet  Google Scholar 

  6. Cohen, G., Honkala, I., Lobstein, A., Zémor, G.: On codes identifying vertices in the two-dimensional square lattice with diagonals. IEEE Trans. Comput. 50 (2), 174–176 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  7. Exoo, G., Junnila, V., Laihonen, T.: Locating-dominating codes in cycles. Australas. J. Combin. 49, 177–194 (2011)

    MathSciNet  MATH  Google Scholar 

  8. Ghebleh, M., Niepel, L.: Locating and identifying codes in circulant networks. Discret. Appl. Math. 161(13-14), 2001–2007 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  9. Gravier, S., Moncel, J., Semri, A.: Identifying codes of cycles. Eur. J. Comb. 27(5), 767–776 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  10. Honkala, I.: An optimal locating-dominating set in the infinite triangular grid. Discret. Math. 306(21), 2670–2681 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  11. Honkala, I., Laihonen, T.: On locating-dominating sets in infinite grids. Eur. J. Comb. 27(2), 218–227 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  12. Honkala, I., Laihonen, T.: On a new class of identifying codes in graphs. Inform. Process. Lett. 102(2-3), 92–98 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  13. Junnila, V., Laihonen, T.: Optimal identifying codes in cycles and paths. Graphs Combin. 28(4), 469–481 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  14. Junnila, V., Laihonen, T.: Collection of codes for tolerant location. In: Proceedings of the Bordeaux Graph Workshop, pp. 176–179 (2016)

  15. Junnila, V., Laihonen, T.: Tolerant location detection in sensor networks. Submitted (2016)

  16. Junnila, V., Laihonen, T., Paris, G.: Solving two conjectures regarding codes for location in circulant graphs. Submitted (2017)

  17. Karpovsky, M.G., Chakrabarty, K., Levitin, L.B.: On a new class of codes for identifying vertices in graphs. IEEE Trans. Inform. Theory 44(2), 599–611 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  18. Manuel, P.: Locating and liar domination of circulant networks. Ars Combin. 101, 309–320 (2011)

    MathSciNet  MATH  Google Scholar 

  19. Rall, D.F., Slater, P.J.: On location-domination numbers for certain classes of graphs. Congr. Numer. 45, 97–106 (1984)

    MathSciNet  MATH  Google Scholar 

  20. Roberts, D.L., Roberts, F.S.: Locating sensors in paths and cycles: The case of 2-identifying codes. Eur. J. Comb. 29(1), 72–82 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  21. Slater, P.J.: Domination and location in acyclic graphs. Networks 17(1), 55–64 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  22. Slater, P.J.: Dominating and reference sets in a graph. J. Math. Phys. Sci. 22, 445–455 (1988)

    MathSciNet  MATH  Google Scholar 

  23. Slater, P.J.: Fault-tolerant locating-dominating sets. Discret. Math. 249(1–3), 179–189 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  24. Xu, M., Thulasiraman, K., Hu, X.-D.: Identifying codes of cycles with odd orders. Eur. J. Comb. 29(7), 1717–1720 (2008)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

We would like to thank the referees for their suggestions which improved the presentation of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ville Junnila.

Additional information

Research of Gabrielle Paris has been supported by the ANR-14-CE25-0006 project of the French National Research Agency.

Appendix

Appendix

The proof of the Theorem 10(ii):

Let \(d\ge 15\), \(d\equiv 3 \pmod {6}\) and \(n = 3d-9\). Notice that \(n\equiv 0 \pmod {6}\). We divide the vertices of the circulant graph into three sections denoted by \(A_{1}=\{0,1,2\dots , d-1\}\), \(A_{2}=\{d,d + 1,\dots , 2d-1\}\) and \(A_{3}=\{0,1,\dots ,n-1\}\setminus (A_{1}\cup A_{2})\). We will first consider the code

$$C_{d}=\{v\mid v\in (A_{1}\cup A_{3}), v\equiv 5 \pmod{6}\} \cup \{v\mid v\in A_{2}, v\equiv 0,4 \pmod{6}\}. $$

Using this code we can construct (by adding later two more codewords) an identifying code in \(C_{n}(1,d-1,d,d + 1)\). The ratio \(|C_{d}|/n\) tends to \(2/9\) as d tends to infinity. First we exclude some ‘borderline’ vertices from the three sections and denote \(A_{1}^{\prime }=A_{1}\setminus \{0,1,2,3,4,5,6,7,8,9,d-1\}\), \(A_{2}^{\prime }=A_{2}\setminus \{d,2d-1\}\) and \(A_{3}^{\prime }=A_{3}\setminus \{2d\}\). We consider the borderline vertices later. It is straightforward to check that the I-sets with regard to the code \(C_{d}\) are as follows for \(x\in A_{1}^{\prime }\cup A_{2}^{\prime }\cup A_{3}^{\prime }\):

figure b
figure c
figure d

Let us compare these I-sets (that is, when \(x\in A_{1}^{\prime }\cup A_{2}^{\prime }\cup A_{3}^{\prime }\)). Clearly, the I-sets of size one are distinguished. Consider then the I-sets of size two. In the tables above, one can found the distances \(c_{1}-c_{2}\) of the codewords in \(I(x)\) with \(c_{1}>c_{2}\). If the distance is different, the I-sets cannot be the same. For those, which have the same distance, the \(c_{1} \pmod {6}\) and \(c_{2} \pmod {6}\) are different as shown in the table, and the I-sets again cannot be the same. Let us study the I-sets of size three then. According to the tables, the codewords in the I-sets are different modulo 6 unless \(x\in A_{1}^{\prime }\) where \(x\equiv 2 \pmod 6\) and \(y\in A_{3}^{\prime }\) where \(y\equiv 2\pmod {6}\). However, now \(I(y)\) has distance 2 between its two largest codewords, but \(I(x)\) has corresponding distance \(d-10\). Consequently, I(x)≠I(y).

For the rest of the vertices (i.e., the borderline vertices \(x\notin A_{1}^{\prime }\cup A_{2}^{\prime }\cup A_{3}^{\prime }\)) we get the following I-sets: \(I(0)=\{d + 1,2d-8,3d-10\}\), I(1) = {d + 1, 2d − 8}, \(I(2)=\{d + 1,d + 3,2d-8,2d-6\}\), \(I(3)=\{d + 3,2d-6\}\), \(I(4)=\{5,d + 3,2d-6\}\), \(I(5)=\{5\}\), \(I(6)=\{5,d + 7,2d-2\}\), \(I(7)=\{d + 7,2d-2\}\), \(I(8)=\{d + 7,d + 9,2d-2\}\), I(9) = {d + 9}, \(I(d-1)=\{2d-2,3d-10\},\)\(I(d)=\{d + 1,3d-10\}\), \(I(2d-1)=\{2d-2\}\) and \(I(2d)=\{d + 1\}\). It is straightforward to check (considering sizes of I-sets, codewords modulo 6 in I-sets and their distances) that we have exactly the following non-distinguished I-sets: \(I(9)=I(d + 9)\), \(I(d-1)=I(d-2)\), \(I(d + 1)=I(2d)\) and \(I(2d-2)=I(2d-1)\). We add two more codewords, namely, 0 and \(2d\) to the code \(C_{d}\) to avoid these same I-sets. Denote \(C_{d}^{\prime }=C_{d}\cup \{0,2d\}\). We should bear in mind that if \(I(C_{d};x)\neq I(C_{d};y)\), then also \(I(C_{d}^{\prime };x)\neq I(C_{d}^{\prime };y)\). Now we have (with respect to \(C_{d}^{\prime }\)) that \(2d\in I(9)\setminus I(d + 9)\), \(0\in I(d-1)\setminus I(d-2)\), 2dI(2d − 1) ∖ I(2d − 2) and \(0\in I(d + 1)\setminus I(2d)\). Therefore, \(C_{d}^{\prime }\) is an identifying code and the proof is completed.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Junnila, V., Laihonen, T. & Paris, G. Optimal bounds on codes for location in circulant graphs. Cryptogr. Commun. 11, 621–640 (2019). https://doi.org/10.1007/s12095-018-0316-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-018-0316-3

Keywords

Mathematics Subject Classification (2010)

Navigation