Research Article
Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks
Figure 1
(a) Collaborating sensor nodes and , (b) sensor node totally overlapped by sensor nodes , , and , and (c) communicating sensor nodes and .
(a) |
(b) |
(c) |