Research Article

Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks

Figure 3

A simple intrusion scenario: an intruder starts from a random point in the WSN and moves in a random fashion and sweeps the surface area following a trajectory .