Research Article
Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks
Figure 3
A simple intrusion scenario: an intruder starts from a random point in the WSN and moves in a random fashion and sweeps the surface area following a trajectory .