On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment | IEEE Journals & Magazine | IEEE Xplore