On the security vulnerabilities of the virtual force approach to mobile sensor deployment