Towards Modeling The Behavior Of Physical Intruders In A Region Monitored By A Wireless Sensor Network