Deployment Strategies And Mechanisms For Intrusion Detection In Wireless Sensor Networks