A. Secure Localization B. Sensor Deployment in Complex Region of Interest C. Security Threats in Clouds: Black Hole Search and Intrusion Detection using Mobile Agents