On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment