On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment