Security challenges in opportunistic communication | IEEE Conference Publication | IEEE Xplore