On the longest vulnerable path inside a sensor network from boundary regions | IEEE Conference Publication | IEEE Xplore