References
[1]. Alajeely, M., Doss, R., & Ahmad, A. A. (2016). Security and trust in opportunistic networks–a survey. IETE Technical Review, 33(3), 256-268.
[2]. Balaganesh, M., & Nalini, N. (2014). A survey of trust based automatic routing in delay tolerant networks. International Journal of Advanced Information Science and Technology. 3, 51-54.
[3]. Barai, S., & Bhaumik, P. (2016). A taxonomy of recent security concerns in opportunistic networks. International Journal for Scientific Research & Development, 1, 34-46.
[4]. Chang, M., Chen, R., Bao, F., & Cho, J. H. (2011). Trust-threshold based routing in delay tolerant networks. In IFIP International Conference on Trust Management (pp. 265-276). Springer, Berlin, Heidelberg.
[5]. Chen, R., Bao, F., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200-1210.
[6]. Goyal, M., & Chaudhary, M. (2013). Ensuring privacy in opportunistic network. IOSR Journal Computer Engineering, 13(2), 74-82.
[7]. Gupta, S., Dhurandher, S. K., Woungang, I., Kumar, A., & Obaidat, M. S. (2013). Trust-based security protocol against blackhole attacks in opportunistic networks. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on (pp. 724-729). IEEE.
[8]. Indikar, N. J & Kattimani L. S. (2015). Dynamic trust and security management protocol for delay tolerant networks using information centric-Networks Architecture. International Journal of Engineering And Computer Science, 4(6), 12698-12704.
[9]. Kaur, E. U., & Kaur, E. H. (2009). Routing techniques for opportunistic networks and security issues. In National Conference on Computing, Communication and Control (CCC) (Vol. 9, No. 2009, pp. 155-161).
[10]. Khot, A., & Mogal, V. (2017). Trust preservation in opportunistic networks. International Journal of Innovative Research in Computer and Communication Engineering, 5, 2489-2494.
[11]. Kungwani, B., & Dudhe, P. (2016). Trust based privacy preserving Friend recommendation in social network web. International Journal of Research in Science & Engineering, 2(5), 38-43.
[12]. Padhi, S., Tiwary, M., Priyadarshini, R., Panigrahi, C. R., & Misra, R. (2016). SecOMN: Improved security approach for Opportunistic Mobile Networks using cyber foraging. In Recent Advances in Information Technology (RAIT), 2016 3rd International Conference on (pp. 415- 421).
[13]. Poonguzharselvi, B., & Vetriselvi, V. (2012). Trust framework for data forwarding in opportunistic networks using mobile traces. International Journal of Wireless & Mobile Networks, 4(6), 115.
[14]. Shikfa, A. (2010). Security issues in opportunistic networks. In Proceedings of the Second International Workshop on Mobile Opportunistic Networking (pp. 215- 216). ACM.
[15]. Singh, R., & Chawla, M. (2014). An efficient trust management technique for delay tolerant network. International Journal of Computer Applications, 98(21) 8- 12.
[16]. Trifunovic, S., & Legendre, F. (2009). Trust in opportunistic networks. Computer Engineering and Network Laboratory, ETH Zurich, Switzerland.
[17]. Verma, A., & Srivastava, D. (2012). Integrated routing protocol for opportunistic networks. arXiv preprint arXiv:1204.1658.
[18]. Wu, Y., Zhao, Y., Riguidel, M., Wang, G., & Yi, P. (2015). Security and trust management in opportunistic networks: A survey. Security and Communication Networks, 8(9), 1812-1827.
[19]. Xi, C., Liang, S., Feng, M. A. J., & Zhuo, M. A. (2015). A trust management scheme based on behavior feed back for opportunistic networks. China Communications, 12(4), 117-129.
[20]. Yao, L., Man, Y., Huang, Z., Deng, J., & Wang, X. (2016). Secure routing based on social similarity in opportunistic networks. IEEE Transactions on Wireless Communications, 15(1), 594-605.