Research Article

Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks

Figure 1

(a) Collaborating sensor nodes and , (b) sensor node totally overlapped by sensor nodes , , and , and (c) communicating sensor nodes and .
(a)
(b)
(c)