1. Y. Wu, Y. Zhao, M. Riguidel, G. Wang, P. Yi, Security and trust management in opportunistic networks: a survey. J. Secur. Commun. Netw. 8(9), 1812–1827 (2015)
2. A. Ahmad, R. Doss, M. Alajeely, K. Ahmad, Securing OppNets from packet integrity attacks using trust and reputation, in 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA) (IEEE, Piscataway, 2017), pp. 7–12
3. A. Shikfa, Security challenges in opportunistic communication, in IEEE GCC Conference and Exhibition (GCC) (IEEE, Piscataway, 2011), pp. 425–428
4. J. Wang, Z.A. Kissel, Introduction to Network Security: Theory and Practice (Wiley, Singapore, 2016)
5. P. Kumar, N. Chauhan, N. Chand, Security framework for opportunistic networks, in Progress in Intelligent Computing Techniques: Theory, Practice, and Applications. Advances in Intelligent Systems and Computing, vol. 719 (Springer, Singapore, 2018), pp. 465–471.